Detection device and method of unknown application bug threat
A threat detection and vulnerability technology, applied in the field of computer communication, can solve the problem of high false alarm rate of new Trojan horse detection, and achieve the effect of solving false alarms
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0037] In order to make the technical solution and characteristics of the present invention clearer, the present invention will be further described in detail below in conjunction with the embodiments and accompanying drawings. Here, the following examples are used to illustrate the present invention, but not to limit the scope of the present invention.
[0038] Such as figure 1As shown, the unknown application vulnerability threat detection device of the present invention includes a sample collection device 1 , a preprocessing filter device 2 , a simulated behavior monitoring device 3 , and a behavior analysis and comparison device 4 .
[0039] Among them, the function of the sample collection device 1 is to collect and restore various file attachments transmitted on the network from network traffic. The acquisition device adopts standard protocol restoration technology, which can restore protocols such as mail / HTTP.
[0040] The pre-processing filtering device 2 is used to...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com