Method, system and storage device for obtaining ip address of Trojan horse control terminal based on self-learning method
An IP address and control terminal technology, applied in the field of network security, can solve problems such as heavy workload, high dependence, and inability to quickly and accurately find the Trojan horse control terminal IP, so as to improve the ability of discovery and avoid the effect of escape detection
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0032] Below in conjunction with accompanying drawing and specific embodiment the present invention is described in further detail:
[0033] Such as figure 1 The method shown is based on the self-learning method to obtain the IP address of the Trojan horse control terminal. Through continuous monitoring of the malicious Trojan horse behavior in the network traffic, the malicious Trojan horse detection capability is continuously improved in a self-learning manner, and the malicious Trojan horse control terminal IP address is accurately identified. address.
[0034] The method for obtaining the IP address of the Trojan horse control terminal based on the self-learning method specifically includes the following steps:
[0035] Step (1): The network traffic analysis system analyzes the mirrored network traffic:
[0036] Identify the network traffic protocol of the network traffic, extract the files transmitted in the network traffic, and discard the network traffic that does not...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 
