Method and system for obtaining IP address of trojan horse control terminal based on self-learning mode
An IP address and control terminal technology, applied in the field of network security, can solve problems such as heavy workload, large dependence, incompleteness, etc., to improve the ability of discovery and avoid escape detection.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0032] Below in conjunction with accompanying drawing and specific embodiment the present invention is described in further detail:
[0033] Such as figure 1 The method shown is based on the self-learning method to obtain the IP address of the Trojan horse control terminal. Through continuous monitoring of the malicious Trojan horse behavior in the network traffic, the malicious Trojan horse detection capability is continuously improved in a self-learning manner, and the malicious Trojan horse control terminal IP address is accurately identified. address.
[0034] The method for obtaining the IP address of the Trojan horse control terminal based on the self-learning method specifically includes the following steps:
[0035] Step (1): The network traffic analysis system analyzes the mirrored network traffic:
[0036] Identify the network traffic protocol of the network traffic, extract the files transmitted in the network traffic, and discard the network traffic that does not...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com