Unlock instant, AI-driven research and patent intelligence for your innovation.

A method for preventing bounce-type Trojans on intranet ports

An intranet and Trojan horse technology, applied in the direction of electrical components, transmission systems, etc., can solve the problem that antivirus software cannot find known Trojan horse variants and new Trojan horses well.

Active Publication Date: 2018-05-18
UNIV OF ELECTRONICS SCI & TECH OF CHINA
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] The purpose of the present invention is to provide a kind of prevention method for rebound type Trojan horse at intranet port, be used for overcoming the problem that antivirus software can't well find the variation of known Trojan horse and new Trojan horse

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method for preventing bounce-type Trojans on intranet ports
  • A method for preventing bounce-type Trojans on intranet ports

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] According to the above description, the technical solutions in the present invention will be further described in detail in conjunction with the drawings and embodiments.

[0033] In this embodiment, it is assumed that an intranet host is A, a network application program on this host is WA, a security label adding module MA, an intranet gateway G, and a security context analysis and control module MG on the gateway.

[0034] First of all, first determine the trusted application program, store its program name and program MD5 value in the trusted program list (key-value list) and store it in the intranet egress gateway, and dynamically add or delete the trusted application list according to needs Content;

[0035] WA connects to the external network to send messages, adds module MA through the security label, adds security context to the message, including the MAC address of the machine, the name of the application that sends the message, and the MD5 check value of the a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the technical field of information security under the network environment, and proposes a method for preventing rebounding Trojan horses in an internal network, which is used to overcome the problem that antivirus software cannot well find known variants of Trojan horses and new Trojan horses. The method first establishes a list of trusted programs, and saves the trusted list at the gateway of the intranet exit; then marks the security context of the sent message, and then extracts the security context in the message at the exit of the intranet, and combines it with the gateway If the program name and MD5 value are consistent with the trusted program list, it will be released, otherwise, the data packet will be discarded, the release will be restricted and recorded in the blacklist. Therefore, the present invention effectively solves the intranet security problem caused by the inability of traditional Trojan horse detection methods to effectively detect variant Trojan horses or new Trojan horses.

Description

technical field [0001] The invention belongs to the technical field of information security under the network environment, and in particular relates to a method for preventing a bounce-back Trojan at an intranet port. Background technique [0002] In the field of network security, malicious codes are growing rapidly, and various malicious codes are flooding the Internet. The most serious ones are viruses and Trojan horses. The purpose of viruses is to destroy computer systems and files, while Trojan horses are more inclined to steal confidential information. . A Trojan has a client and a server. Generally speaking, the server and the client cooperate with each other to complete some activities of destruction and information theft. At present, Trojan horses can completely avoid killing and hide their own traces. Due to firewall restrictions, most Trojan horses are now rebounding Trojan horses. [0003] Rebound port Trojan exploits the weakness of the firewall: [0004] Fir...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/0236H04L63/0245H04L63/145
Inventor 张小松白金牛伟纳徐浩然吴安彬唐海洋张林
Owner UNIV OF ELECTRONICS SCI & TECH OF CHINA