Unlock instant, AI-driven research and patent intelligence for your innovation.

Computer-readable storage medium for tracing Trojan horse source and Trojan horse source traceability system using the medium

A storage medium and computer technology, which is applied in the field of computer-readable storage media for tracing the source of Trojan horses, and can solve problems such as the difficulty of tracing the source of Trojan horses

Active Publication Date: 2021-01-19
广东世纪网通信设备股份有限公司
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, there are too many types of Trojan horses, and some Trojan horses will send the information obtained from the client to a mailbox, or connect to an overseas / false IP address, or even some network space, which makes it extremely difficult to trace the source of the Trojan horse

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] The present embodiment provides the Trojan horse source tracing system and the method for tracing the Trojan horse source running on the system, the specific steps of the method are as follows:

[0026] 1. The server identification step. The Trojan source tracing system obtains the local Trojan data of the server where the Trojan is implanted, and identifies the client address information in the Trojan data. The local Trojan horse data is stored in the configuration file of the Trojan horse program. In this embodiment, the configuration file storing the local Trojan horse data is obtained by judging whether the configuration file matches the Trojan horse program.

[0027] In the server identification step, after obtaining the local Trojan horse data, the local file location step is first performed, and the local file location step includes the following steps:

[0028] The step of obtaining the contract sending process is to obtain the process of sending the contract to...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical field of the network security, and especially relates to a computer readable storage medium for tracking a Trojan source. A computer program is saved in the medium, and the computer program can be executed by a processor of a Trojan source tracing system. The Trojan source tracing system is deployed on a network server, the processor of the Trojan source tracing system acquires local Trojan data of a server side in which the Trojan is implanted, client address information for controlling or attempting to control the server side can be found by analyzing the content of the local Trojan data, and then the client can be found along the client address information, and the data of the client is analyzed. The client in which the Trojan same as that in the server-side is not implanted is a host used by a criminal offender for implanting the Trojan in all probability, the criminal offender certainly needs the client to process the information acquired from the server side, and the IP address used by the criminal offender can be identified by analyzing an access log of the storage address of the information, and the Trojan source is found.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a computer-readable storage medium for tracing the source of a Trojan horse. The medium stores a computer program, and the computer program can be executed by a processor of a system for tracing the source of a Trojan horse. Background technique [0002] With the development of communication technology and the popularization of the Internet, people pay more and more attention to network security issues. As a common network hazard, Trojan horses mainly come from phishing webpages, webpages linked to horses, and emails / pictures containing threatening IPs, domain names, and URLs. etc. People's active or passive communication behaviors in the network may cause computer terminals or servers to be implanted with Trojan horses, which will cause more and more losses to users' information security and economic interests. [0003] At present, the detection of Trojan horses mainly ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06G06F21/56
CPCG06F21/568H04L63/145H04L2463/146
Inventor 李涛姚稳周文财封期冬蒋超强唐荔莫嘉宝
Owner 广东世纪网通信设备股份有限公司