Mining Trojan horse detection system based on flow analysis

A traffic analysis and detection system technology, applied in transmission systems, digital transmission systems, electrical components, etc., to prevent the network from being invaded by mining Trojans and achieve high real-time effects

Active Publication Date: 2020-03-27
上海视岳计算机科技有限公司
View PDF10 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] At present, the detection methods of mining Trojans are concentrated on the host side. The traditional detection methods include identifying abnormally high CPU usage, identifying abnormally high hash calculations, identifying codes of malicious processes or malicious files, and monitoring abnormally high heat. The hardware temperature of the system, the use of active defense software to monitor the calls of sensitive system resources and functions by the process, and the use of the blacklist mechanism to block the mining pool addresses used by known mining Trojan horses, etc., can perform more accurate behaviors on the mining Trojan horse at the host level Judgment, however, there are still deficiencies in the judgment method based on the host level. The mining Trojan horse can use technologies such as Rootkit to hide the mining process, hide features by limiting CPU usage and usage time, and use technical means such as packing and code obfuscation to avoid The matching of code fragments in the virus database uses "fileless" technology or process image replacement to hide files. The identification method based on the host side has inherent defects and deficiencies in the fight against various hiding methods

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Mining Trojan horse detection system based on flow analysis
  • Mining Trojan horse detection system based on flow analysis

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] The following describes several preferred embodiments of the present invention with reference to the accompanying drawings, so as to make the technical content clearer and easier to understand. The present invention can be embodied in many different forms of embodiments, and the protection scope of the present invention is not limited to the embodiments mentioned herein.

[0034] In the drawings, components with the same structure are denoted by the same numerals, and components with similar structures or functions are denoted by similar numerals. The size and thickness of each component shown in the drawings are shown arbitrarily, and the present invention does not limit the size and thickness of each component. In order to make the illustration clearer, the thickness of parts is appropriately exaggerated in some places in the drawings.

[0035]The mining Trojan detection system based on traffic analysis of the present invention proposes to use the method of traffic a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a mining Trojan horse detection system based on flow analysis, which relates to the field of computer network security and comprises a connectionmining pool mining Trojan horsebehavior detection subsystem and a p2p mining network mining Trojan horse behavior detection subsystem. According to the invention, the static pcap data packet or the real-time flow is used as the input, two modes of detecting and connecting mine pool mining and p2p mining can be selected, the mining flow is analyzed through the field feature extraction or communication flow feature extraction and identification of the system, and the alarm information is output to the user. Aiming at the conditions of plaintext communication and ciphertext communication, the system has the capability of quickly processing mass data, and can meet the requirements of personal hosts and enterprise-level users at the same time.

Description

technical field [0001] The invention relates to the field of computer network security, in particular to a mining Trojan horse detection system based on flow analysis. Background technique [0002] The blockchain is a huge decentralized ledger, and in the decentralized system, the status of each participating node is equal. In order to maintain the consistency of the blockchain at each node, the blockchain system requires each node to follow the same Consensus mechanism to achieve consensus. A widely adopted consensus mechanism is the proof-of-work (PoW) mechanism proposed by Satoshi Nakamoto in 2009. Nodes participating in the blockchain network use the computing power of computers (hereinafter referred to as computing power) to perform "difficult calculations" to obtain A random number answer that meets the difficulty requirements. If the answer is calculated and verified by the entire network, the node will have the right to generate and record the block, and will receiv...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L12/24
CPCH04L41/069H04L63/1425H04L63/145
Inventor 邹福泰裘炜程马兴华胡秉晖唐俊华李林森
Owner 上海视岳计算机科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products