Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Botnet host detection method, system and device and storage medium

A zombie host and detection method technology, applied in the field of network security, can solve problems such as attacking external network services to steal corporate sensitive information, difficulty in clearing zombie host virus programs, and leaking corporate secrets

Active Publication Date: 2020-06-23
SANGFOR TECH INC
View PDF6 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] Botnet (Botnet) is a common threat in various networks. It sends malicious codes to user hosts through emails, web scripts, etc. A one-to-many controllable network is formed between attackers and zombie hosts. Attackers spread bots through various channels to infect a large number of hosts on the Internet, and zombie hosts receive instructions from attackers through a control channel. Including attacking external network services or stealing sensitive corporate information, etc. Once these attacks occur, they will consume a lot of network resources and may leak corporate secrets
[0003] At present, firewalls are often used to detect zombie hosts. However, currently through the firewall, it is only possible to know whether the user host has zombie host behavior, but cannot know the abnormal program that causes the user host to have zombie host behavior. virus program

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Botnet host detection method, system and device and storage medium
  • Botnet host detection method, system and device and storage medium
  • Botnet host detection method, system and device and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] The following will clearly and completely describe the technical solutions in the embodiments of the present application with reference to the drawings in the embodiments of the present application. Obviously, the described embodiments are only some of the embodiments of the present application, not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of this application.

[0047] At present, firewalls are often used to detect zombie hosts. However, currently through the firewall, it is only possible to know whether the user host has zombie host behavior, but cannot know the abnormal program that causes the user host to have zombie host behavior. virus program.

[0048] Therefore, the core of this application is to provide a zombie host detection method, so that the user can know the abnormal program that causes the user host to hav...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a zombie host detection method, system and device and a storage medium. According to the method, the linkage relationship between the firewall device and the user host is detected; after the firewall equipment detects that the user host has a zombie host behavior; furthermore, the information of the related programs causing the user host to have zombie host behaviors is obtained through the user host, so that the user can learn the abnormal programs causing the user host to have zombie host behaviors through the firewall, and the user is ensured to be capable of clearing the abnormal programs in the zombie host in a targeted manner. In addition, the invention further provides a zombie host detection system, zombie host detection equipment and a storage medium, whichhave the same beneficial effects.

Description

technical field [0001] The present application relates to the field of network security, in particular to a method, system, equipment and storage medium for detecting a zombie host. Background technique [0002] Botnet (Botnet) is a common threat in various networks. It sends malicious codes to user hosts through emails, web scripts, etc. A one-to-many controllable network is formed between attackers and zombie hosts. Attackers spread bots through various channels to infect a large number of hosts on the Internet, and zombie hosts receive instructions from attackers through a control channel. Including attacking external network services or stealing sensitive corporate information, once these attacks occur, they will consume a lot of network resources and may leak corporate secrets. [0003] At present, firewalls are often used to detect zombie hosts. However, currently through the firewall, it is only possible to know whether the user host has zombie host behavior, but can...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/1416H04L63/145H04L63/02H04L2463/144
Inventor 黎子流
Owner SANGFOR TECH INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products