Method and system for preventing remote control type Trojan viruses
A Trojan horse and remote control technology, applied in the field of network security, can solve problems such as single function, undetectable, low recognition rate, etc., to achieve the effect of preventing operation and reducing the probability of false positives and false positives
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example Embodiment
[0040] In order for those skilled in the art to better understand the technical solutions in the embodiments of the present invention, and to make the above objects, features and advantages of the present invention more clearly understood, the technical solutions in the present invention are further detailed below with reference to the accompanying drawings. illustrate.
[0041] The present invention provides a method and system for preventing remote control Trojan horse viruses, which can effectively prevent the running of remote control Trojan horses, block the entry and exit of malicious traffic, and protect user computers from being harmed.
[0042] A method for preventing remote control Trojan-like virus, such as figure 1 shown, including:
[0043] S101: Capture the data packet traffic in the network; for the captured data packet traffic, it can be stored in a special server device for aggregation, which is convenient for subsequent judgment, and multiple servers can be se...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap