Mining Trojan horse detection method and device

A detection method and Trojan horse technology, applied in the field of network security, can solve the problems of the lag of the mining Trojan detection method, the inability of the antivirus software client to effectively detect the terminal equipment, etc.

Pending Publication Date: 2020-12-15
BEIJING QIHOO TECH CO LTD
View PDF0 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] At present, when detecting whether a mining Trojan program is implanted in a terminal device, the antivirus software client is usually used for static detection or dynamic detection. Update the mining Trojan horse program, which makes the existing mining Trojan horse detection method lag, which makes it impossible to effectively detect whether the mining Trojan horse program is implanted in the terminal device through the anti-virus software client

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Mining Trojan horse detection method and device
  • Mining Trojan horse detection method and device
  • Mining Trojan horse detection method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0063] Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited by the embodiments set forth herein. Rather, these embodiments are provided for more thorough understanding of the present disclosure and to fully convey the scope of the present disclosure to those skilled in the art.

[0064] The embodiment of the present invention provides a method for detecting a mining Trojan horse, such as figure 1 As shown, the method includes:

[0065] 101. Receive user behavior logs uploaded by multiple clients.

[0066] In the embodiment of the present invention, when the antivirus software client detects whether the program in the terminal device is a mining Trojan program, when the antivirus software client cannot dete...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a mining Trojan horse detection method and device, relates to the technical field of network security, and aims to effectively detect whether a mining Trojan horse program is implanted into terminal equipment. The method comprises the following steps: receiving user behavior logs uploaded by a plurality of clients; matching each command line with a preset rule so as to extract keywords contained in each command line from each command line; performing statistical processing on the plurality of keywords to determine high-risk keywords; when a to-be-detected user behaviorlog is received, matching a plurality of to-be-detected command lines contained in the to-be-detected user behavior log with a preset rule so as to extract to-be-detected keywords contained in each to-be-detected command line from each to-be-detected command line; when it is judged that the to-be-detected keyword is the high-risk keyword, determining the to-be-detected command line where the to-be-detected keyword is located as a mining Trojan horse command line. The method and the device are suitable for the process of detecting whether the mining Trojan horse program is implanted into the terminal equipment.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a method and device for detecting a mining Trojan. Background technique [0002] With the continuous development of blockchain technology, digital encrypted currency with advantages such as high security and transparent transaction process is widely used in the financial field. However, the issuance of digital encrypted currency directly leads to the birth of mining Trojans, and more and more Many lawbreakers have begun to earn illegal profits through mining Trojan horse programs: because digital encrypted currency is obtained by computers and other terminal equipment through a large number of calculations based on specific algorithms, when criminals implant mining Trojan horse programs into After entering the victim's terminal device, criminals can use the victim's terminal device to mine, thereby earning illegal profits. Therefore, how to effectively detect and remove...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06G06F21/56G06F16/18G06F16/2458
CPCG06F21/562G06F16/1815G06F16/2462H04L63/1425H04L63/145
Inventor 彭力扬李丽平
Owner BEIJING QIHOO TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products