An encrypted Trojan horse detection method for https covert tunnel
A detection method and Trojan horse technology, applied in transmission systems, electrical components, etc., can solve problems such as unsatisfactory results, complicated environments, and difficulty in obtaining new sample flow, and achieve the effect of improving detection accuracy
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0045] Embodiment 1: a kind of encryption Trojan detection method facing HTTPS covert tunnel, comprises the following steps:
[0046] Due to the strong discreteness of Trojan horse communication traffic, a TCP session is divided into multiple data packet groups according to the time difference between adjacent data packets. The data packet group is a set of data packets with strong time correlation, which is managed in the form of a list in the present invention. If the time difference between two adjacent data packets does not exceed the time threshold T, they are considered to belong to the same data packet group, otherwise, they are considered to be different data packet groups.
[0047] basic definition
[0048] Definition 1 triplet includes: source IP address, destination IP address and upper layer protocol. can be expressed as .
[0049] Definition 2 packet list Expressed as .
[0050] Definition 3 records the source IP address, destination IP address, arriva...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


