Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A zombie host detection method, system, device and storage medium

A technology of a zombie host and a detection method, applied in the field of network security, can solve the problems of attacking external network services to steal sensitive information of enterprises, revealing enterprise secrets, and difficult to remove virus programs of zombie hosts in a targeted manner.

Active Publication Date: 2022-08-09
SANGFOR TECH INC
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] Botnet (Botnet) is a common threat in various networks. It sends malicious codes to user hosts through emails, web scripts, etc. A one-to-many controllable network is formed between attackers and zombie hosts. Attackers spread bots through various channels to infect a large number of hosts on the Internet, and zombie hosts receive instructions from attackers through a control channel. Including attacking external network services or stealing sensitive corporate information, etc. Once these attacks occur, they will consume a lot of network resources and may leak corporate secrets
[0003] At present, firewalls are often used to detect zombie hosts. However, currently through the firewall, it is only possible to know whether the user host has zombie host behavior, but cannot know the abnormal program that causes the user host to have zombie host behavior. virus program

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A zombie host detection method, system, device and storage medium
  • A zombie host detection method, system, device and storage medium
  • A zombie host detection method, system, device and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application. Obviously, the described embodiments are only a part of the embodiments of the present application, but not all of the embodiments. All other embodiments obtained by those of ordinary skill in the art based on the embodiments in the present application without creative work fall within the protection scope of the present application.

[0047] At present, firewalls are often used to detect zombie hosts, but currently, only through the firewall can we know whether the user host has zombie host behavior, but we cannot know the abnormal program that causes the user host to have zombie host behavior, so it is difficult to remove the zombie host in a targeted manner. virus program.

[0048] Therefore, the core of the present application is to provide a zombie host detection method, so...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present application discloses a method, system, device and storage medium for detecting a zombie host. The method uses the linkage relationship between a firewall device and a user host that detects it, and after the firewall device detects that the user host has zombie host behavior, further The user host obtains information about the relevant programs that cause it to behave as a zombie host, so the user can learn about the abnormal program that causes the user host to behave as a zombie host through the firewall, thereby ensuring that the user can remove the abnormal program in the zombie host in a targeted manner. In addition, the present application also provides a zombie host detection system, equipment and storage medium, the beneficial effects are the same as those described above.

Description

technical field [0001] The present application relates to the field of network security, and in particular, to a method, system, device and storage medium for detecting a zombie host. Background technique [0002] Botnet is a common threat in all kinds of networks. It sends malicious codes to user hosts and executes them in various forms such as emails and web scripts, so as to achieve the purpose of controlling user hosts to become zombie hosts. A one-to-many controllable network is formed between the attacker and the zombie host. The attacker spreads the bot program to infect a large number of hosts on the Internet through various channels, and the zombie host receives the attacker's instructions through a control channel. Including attacking external network services or stealing sensitive corporate information, etc. Once these attacks occur, network resources will be greatly consumed, and corporate secrets may also be leaked. [0003] At present, firewalls are often used...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40
CPCH04L63/1416H04L63/145H04L63/02H04L2463/144
Inventor 黎子流
Owner SANGFOR TECH INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products