Method and device for detecting website Trojan horse backdoor based on cloud protection environment
A web Trojan and Trojan technology, applied in the field of website Trojan backdoor detection based on cloud protection environment, can solve problems such as slow Trojan recognition speed and poor Trojan recognition accuracy, and achieve the effect of alleviating the slow recognition speed of Trojan horses
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0029] According to an embodiment of the present invention, an embodiment of a method for detecting a website Trojan horse backdoor based on a cloud protection environment is provided. system, and, although a logical order is shown in the flowcharts, in some cases the steps shown or described may be performed in an order different from that shown or described herein.
[0030] figure 1 It is a flow chart of a method for detecting a website Trojan horse backdoor based on a cloud protection environment according to an embodiment of the present invention, as figure 1 As shown, the method includes the following steps:
[0031] Step S102, obtaining the cache file generated when the target object accesses the server;
[0032] In the embodiment of the present invention, the cache file generated when the target object accesses the server is obtained through the cloud platform.
[0033] Step S104, using the fuzzy file algorithm to calculate the cache file to obtain the score value of...
Embodiment 2
[0084] The embodiment of the present invention also provides a website Trojan horse backdoor detection device based on the cloud protection environment. The Trojan horse backdoor detection method, the following is a specific introduction to the website Trojan horse backdoor detection device based on the cloud protection environment provided by the embodiment of the present invention.
[0085] Figure 5 It is a schematic diagram of a website Trojan horse backdoor detection device based on a cloud protection environment according to an embodiment of the present invention, as Figure 5 As shown, the website Trojan horse backdoor detection device based on the cloud protection environment mainly includes an acquisition unit 10, a calculation unit 20, a judgment unit 30 and an interception unit 40, wherein:
[0086] An acquisition unit 10, configured to acquire a cache file generated when the target object accesses the server;
[0087] The calculation unit 20 is used to calculate ...
Embodiment 3
[0098] see Figure 6 The embodiment of the present invention also provides a website Trojan horse backdoor detection device 100 based on a cloud protection environment, including: a processor 60, a memory 61, a bus 62 and a communication interface 63, and the processor 60, the communication interface 63 and the memory 61 pass through A bus 62 is connected; the processor 60 is used to execute executable modules stored in the memory 61 , such as computer programs.
[0099] Wherein, the memory 61 may include a high-speed random access memory (RAM, Random Access Memory), and may also include a non-volatile memory (non-volatile memory), such as at least one disk memory. The communication connection between the system network element and at least one other network element is realized through at least one communication interface 63 (which may be wired or wireless), and the Internet, wide area network, local network, metropolitan area network, etc. can be used.
[0100] The bus 62 ca...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


