Telecommunication fraud Trojan horse program intercepting method and device, terminal and storage medium

A Trojan horse program and program technology, applied in the field of network security, can solve the problems that the telecommunications fraud Trojan horse program cannot be identified and intercepted in time, and the success rate of telecommunications fraud Trojan horse interception is low, so as to avoid the low interception rate and improve detection and interception rate effect

Active Publication Date: 2018-09-14
TENCENT TECH (SHENZHEN) CO LTD
View PDF4 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The embodiment of this application provides a method, device, terminal and storage medium for intercepting telecommunications fraud Trojan horse programs, which can solve the problem of realizing the interception function based on marked telecommunications fraud Trojan horse programs. At this time, the new type of telecommunications fraud Trojan horse program cannot be identified and intercepted in time, resulting in a low success rate of telecommunications fraud Trojan horse interception

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Telecommunication fraud Trojan horse program intercepting method and device, terminal and storage medium
  • Telecommunication fraud Trojan horse program intercepting method and device, terminal and storage medium
  • Telecommunication fraud Trojan horse program intercepting method and device, terminal and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] In order to make the purpose, technical solution and advantages of the present application clearer, the implementation manners of the present application will be further described in detail below in conjunction with the accompanying drawings.

[0034] For ease of understanding, the terms involved in the embodiments of the present application are explained below.

[0035] Remote control: refers to the behavior of using a terminal (such as a personal computer) to control another or multiple terminals to perform operations through the network. Usually, remote control is implemented between terminals through an installed remote control program, and common remote control programs include Teamviewer, LookMyPC, RemoteView, and the like.

[0036] Message Digest Algorithm 5 (MD5): A hash function used in the field of computer security to convert data (or files) into fixed-length strings. Even if very little data in the original data is changed, the MD5 value of the original dat...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a telecommunication fraud Trojan horse program intercepting method and device, a terminal and a storage medium, and belongs to the field of network security. The method comprises the steps that it is monitored whether or not a program in the terminal initiates network connection; if yes, process information and communication information of the program are acquired, the process information at least comprises a process path corresponding to the program, and the communication information at least comprises a communication port corresponding to a network linking; accordingto the communication port, it is identified whether or not the program is a remote control program; if yes, according to a file under the process path, it is identified whether or not the program haspreset telecommunication fraud features; if yes, the program is determined as a telecommunication fraud Trojan horse program and is intercepted. According to the method, based on the communication port and the process file, program interception is achieved, and the problem that labeling is not timely so as to cause low interception rate is solved, thereby improving the detection and interception rate of novel telecommunication fraud Trojan horse programs.

Description

technical field [0001] The embodiments of the present application relate to the technical field of network security, and in particular to a method, device, terminal and storage medium for intercepting telecommunications fraud Trojan programs. Background technique [0002] The rapid development of Internet technology brings convenience to people's daily life, but also brings many security risks. For example, criminals began to use the Internet to carry out telecom fraud. [0003] When criminals commit telecommunications fraud, they first fabricate false information through phone calls, the Internet, or text messages to lure victims into the scam, and then instruct victims to download and install telecommunications fraud Trojan horse programs, so as to remotely control the victim's terminal through telecommunications fraud Trojan horse programs Perform transfer operations. In order to reduce the incidence of telecom fraud, more and more antivirus applications have begun to h...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/51
CPCG06F21/51G06F2221/033
Inventor 全永春饶帅程虎廖崇粮
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products