A method of active defense against Trojan horses based on virtual environment
An active defense and virtual environment technology, applied in the field of network security, can solve problems such as server-side attacks
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0031] The purpose and effects of the present invention will become more apparent by describing the present invention in detail below with reference to the accompanying drawings.
[0032] Such as figure 1 and figure 2 Shown, the active defense Trojan method of the present invention based on virtual environment comprises the following steps:
[0033] 1. The construction of the virtual controller, this step mainly includes the following two situations:
[0034] (1) During system initialization or operation, a virtual controller is automatically constructed: C={c i |i=1,2,…,n}, where n is the number of virtual controllers to be constructed, c i is the i-th virtual controller;
[0035] (2) During operation, when all virtual controllers c i The amount of tasks in the work queue is greater than the threshold Task max , to automatically create a new virtual controller c i+1 . Threshold Task max It can be determined freely according to the actual situation, for example, it c...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 

