Botnet, Trojan horse and worm network analysis method and system based on logs
A zombie network and analysis method technology, applied in the field of zombie network analysis based on DNS logs and RADIUS logs, can solve the problem that there is no way to dig out unknown zombies or bot programs.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0063] The implementation of the present invention will be described in detail below in conjunction with the accompanying drawings and examples, so as to fully understand and implement the process of how to apply technical means to solve technical problems and achieve technical effects in the present invention. It should be noted that, as long as there is no conflict, each embodiment and each feature in each embodiment of the present invention can be combined with each other, and the formed technical solutions are all within the protection scope of the present invention.
[0064] Based on the above problems, the present invention is based on the big data analysis platform HADOOP, combined with user online behavior logs (DNS logs) and RADIUS logs, to analyze the common behavioral characteristics of known zombie and worm websites and their bots, to find suspected virus control terminals, and to dig out A relatively complete panorama of botnets.
[0065] Among them, this technica...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com