A method for preventing bounce-type Trojans on intranet ports
An intranet and Trojan horse technology, applied in the direction of electrical components, transmission systems, etc., can solve the problem that antivirus software cannot find known Trojan horse variants and new Trojan horses well.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0032] According to the above description, the technical solutions in the present invention will be further described in detail in conjunction with the drawings and embodiments.
[0033] In this embodiment, it is assumed that an intranet host is A, a network application program on this host is WA, a security label adding module MA, an intranet gateway G, and a security context analysis and control module MG on the gateway.
[0034] First of all, first determine the trusted application program, store its program name and program MD5 value in the trusted program list (key-value list) and store it in the intranet egress gateway, and dynamically add or delete the trusted application list according to needs Content;
[0035] WA connects to the external network to send messages, adds module MA through the security label, adds security context to the message, including the MAC address of the machine, the name of the application that sends the message, and the MD5 check value of the a...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 

