Recognition method, device and electronic device for remote control back connection behavior
A behavioral and remote control technology, applied in the computer field, can solve problems such as low efficiency and heavy recognition tasks, and achieve the effect of improving efficiency and narrowing the recognition range.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
specific Embodiment approach
[0042] Constructing a network graph based on suspicious clients and suspicious servers; determining target clients and target servers in the network graph that have remote control connection back behavior based on machine learning algorithms.
[0043] In a specific implementation, this embodiment provides a specific implementation of building a network graph based on suspicious clients and suspicious servers:
[0044] Take suspicious clients and suspicious servers as network nodes. According to the number of requests for the first domain name and the first domain name and the number of requests for the second domain name and the second domain name, the request access relationship between the suspicious client and the suspicious server is regarded as a network segment between network nodes, based on network nodes and network segments Get a network map. For example, see e.g. figure 2 In the network diagram shown, the suspicious server and the possible client are respectively ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


