A Trojan Horse Detection Method Based on Computer Memory Analysis Technology
A technology of memory analysis and detection method, which is applied to the detection of information security incidents and various computer attack incidents, and in the field of Trojan horse detection based on computer memory analysis technology, which can solve the problems of high false alarm rate, difficulty in finding malicious code, and difficulty in application , to achieve reliable detection results and prevent the impact of Trojan horse detection results
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0050] The present invention will be further described below in conjunction with the accompanying drawings and embodiments.
[0051] like figure 1 As shown, a schematic diagram of the composition of the Trojan horse detection method based on the computer memory analysis technology of the present invention is provided. The Trojan horse detection method based on the memory analysis technology of the present invention includes behavior monitoring, malicious code detection, comprehensive analysis of disk information, and comprehensive correlation analysis. , The test result presents five parts.
[0052] The behavior monitoring part of the present invention includes four sub-parts: process operation behavior monitoring, registry behavior monitoring, file operation behavior monitoring, and network data monitoring; the malicious code detection part is based on memory analysis technology detection, including dynamic link library detection, malicious process Detection, hidden process ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


