USB camouflage intrusion detection method and device
A detection method and a detection device technology, which are applied in the field of information security, can solve problems such as detection and defense technologies that cannot be discovered in time, and achieve the effect of improving system security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0044] The embodiment of the present invention provides a USB masquerading intrusion detection method and device, which can improve system security by timely discovering damage activities to the target machine or information stealing activities to the target machine initiated based on the USB interface.
[0045] In order to make the purpose, features and advantages of the present invention more obvious and understandable, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the following The described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.
[0046] see figure 1 , figure 1 ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


