Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and device for detecting website Trojan horse backdoor based on cloud protection environment

A web Trojan and Trojan technology, applied in the field of website Trojan backdoor detection based on cloud protection environment, can solve problems such as slow Trojan recognition speed and poor Trojan recognition accuracy, and achieve the effect of alleviating the slow recognition speed of Trojan horses

Active Publication Date: 2020-09-04
HANGZHOU ANHENG INFORMATION TECH CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In view of this, the object of the present invention is to provide a method and device for detecting a Trojan horse backdoor on a website based on a cloud protection environment, so as to alleviate the slow recognition speed of Trojan horses when the traditional Trojan horse inspection method is used for Trojan horse inspection, and the problem of Trojan horse recognition. Technical issues with poor accuracy

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for detecting website Trojan horse backdoor based on cloud protection environment
  • Method and device for detecting website Trojan horse backdoor based on cloud protection environment
  • Method and device for detecting website Trojan horse backdoor based on cloud protection environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0029] According to an embodiment of the present invention, an embodiment of a method for detecting a website Trojan horse backdoor based on a cloud protection environment is provided. system, and, although a logical order is shown in the flowcharts, in some cases the steps shown or described may be performed in an order different from that shown or described herein.

[0030] figure 1 It is a flow chart of a method for detecting a website Trojan horse backdoor based on a cloud protection environment according to an embodiment of the present invention, as figure 1 As shown, the method includes the following steps:

[0031] Step S102, obtaining the cache file generated when the target object accesses the server;

[0032] In the embodiment of the present invention, the cache file generated when the target object accesses the server is obtained through the cloud platform.

[0033] Step S104, using the fuzzy file algorithm to calculate the cache file to obtain the score value of...

Embodiment 2

[0084] The embodiment of the present invention also provides a website Trojan horse backdoor detection device based on the cloud protection environment. The Trojan horse backdoor detection method, the following is a specific introduction to the website Trojan horse backdoor detection device based on the cloud protection environment provided by the embodiment of the present invention.

[0085] Figure 5 It is a schematic diagram of a website Trojan horse backdoor detection device based on a cloud protection environment according to an embodiment of the present invention, as Figure 5 As shown, the website Trojan horse backdoor detection device based on the cloud protection environment mainly includes an acquisition unit 10, a calculation unit 20, a judgment unit 30 and an interception unit 40, wherein:

[0086] An acquisition unit 10, configured to acquire a cache file generated when the target object accesses the server;

[0087] The calculation unit 20 is used to calculate ...

Embodiment 3

[0098] see Figure 6 The embodiment of the present invention also provides a website Trojan horse backdoor detection device 100 based on a cloud protection environment, including: a processor 60, a memory 61, a bus 62 and a communication interface 63, and the processor 60, the communication interface 63 and the memory 61 pass through A bus 62 is connected; the processor 60 is used to execute executable modules stored in the memory 61 , such as computer programs.

[0099] Wherein, the memory 61 may include a high-speed random access memory (RAM, Random Access Memory), and may also include a non-volatile memory (non-volatile memory), such as at least one disk memory. The communication connection between the system network element and at least one other network element is realized through at least one communication interface 63 (which may be wired or wireless), and the Internet, wide area network, local network, metropolitan area network, etc. can be used.

[0100] The bus 62 ca...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a website Trojan backdoor detection method and device under a cloud protecting environment and relates to the technical field of network safety. The method includes: acquiring the cache file, generated when a target object visits a server, of the target object; using a vague file algorithm to calculate the cache file to obtain the score of the cache file, wherein the score is used for representing the probability that the target object is a website Trojan or a Trojan backdoor; judging whether the cache file is a webpage Trojan file or not according to the score; if so, stopping the target object from visiting the server, and eliminating the target object. By the method, the technical problem that a traditional Trojan detection method is slow in Trojan identificationand low in Trojan identification accuracy during Trojan detection is relieved.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a method and device for detecting a Trojan horse backdoor of a website based on a cloud protection environment. Background technique [0002] In the big data environment, the application scenarios of the cloud environment are more complex, and the application of cloud technology is more extensive. At the same time, in the cloud environment, user files, a large number of user files are stored on the cloud environment platform with cloud technology. At the same time, attackers use the characteristics of large file changes and fast file changes in the cloud environment to construct Trojan horse backdoors, encrypted backdoors, and encoded webshells (webpage backdoors) in many ways to bypass normal antivirus software inspections, so in the face of new environmental systems We need a new detection method to quickly detect Trojan horse backdoors for files in the cloud environme...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/56
CPCG06F21/565
Inventor 史光庭范渊
Owner HANGZHOU ANHENG INFORMATION TECH CO LTD