Attack chain behavior analysis based Trojan horse detection method and system
A behavior analysis and Trojan horse technology, applied in the field of network security, can solve the problems of multiple false positives, existence, various types of application services, etc., and achieve the effect of low false negative rate and high accuracy rate
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0039] First of all, it should be explained that the present invention is an application of computer technology in the field of information security technology. During the implementation of the present invention, the application of multiple software function modules will be involved. The applicant believes that after carefully reading the application documents and accurately understanding the realization principle and purpose of the present invention, and in combination with existing known technologies, those skilled in the art can fully implement the present invention by using their software programming skills. All the software functional modules mentioned in the application documents of the present invention belong to this category, and the applicant will not list them one by one.
[0040] Below in conjunction with accompanying drawing and specific embodiment the present invention is described in further detail:
[0041] Such as figure 1 The Trojan horse detection system b...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com