Computer-readable storage medium for tracing Trojan horse source and Trojan horse source traceability system using the medium
A storage medium and computer technology, which is applied in the field of computer-readable storage media for tracing the source of Trojan horses, and can solve problems such as the difficulty of tracing the source of Trojan horses
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
Embodiment Construction
[0025] The present embodiment provides the Trojan horse source tracing system and the method for tracing the Trojan horse source running on the system, the specific steps of the method are as follows:
[0026] 1. The server identification step. The Trojan source tracing system obtains the local Trojan data of the server where the Trojan is implanted, and identifies the client address information in the Trojan data. The local Trojan horse data is stored in the configuration file of the Trojan horse program. In this embodiment, the configuration file storing the local Trojan horse data is obtained by judging whether the configuration file matches the Trojan horse program.
[0027] In the server identification step, after obtaining the local Trojan horse data, the local file location step is first performed, and the local file location step includes the following steps:
[0028] The step of obtaining the contract sending process is to obtain the process of sending the contract to...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More