A method and device for detecting a lost host
A detection method and host technology, applied in the field of network security, can solve the problems of low detection efficiency, host detection of encrypted traffic loss, poor applicability, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0054] Please see figure 1 , figure 1 A schematic flowchart of a method for detecting a compromised host is provided for the embodiment of the present application. This method is applied in the scenario of compromised host detection based on TLS encrypted communication. Wherein, the compromised host detection method includes:
[0055] S101. Obtain communication traffic to be detected.
[0056] In the embodiment of the present application, the execution subject of the method may be a defect detection device, and the defect detection device may specifically be a computing device such as a computer or a server, which is not limited in this embodiment.
[0057] In the embodiment of the present application, the defect detection device may specifically be an electronic device such as a smart phone, a tablet computer, etc., which is not limited in this embodiment.
[0058] In the embodiment of the present application, the communication traffic to be detected may specifically be T...
Embodiment approach
[0074] As an optional implementation, the method also includes:
[0075] Obtain the original fingerprint data used to build the malicious fingerprint database, the original fingerprint data includes the original fingerprint data obtained by malicious fingerprint crawling and the original fingerprint data obtained by sandbox running malicious program files;
[0076] Construct a malicious fingerprint library based on the original fingerprint data.
[0077] In the embodiment of the present application, the original fingerprint data obtained by malicious fingerprint crawling includes continuously crawling open source malicious TLS fingerprints, and the original fingerprint data obtained by sandbox running malicious program files includes sandbox continuous running of different malicious program files (such as Trojan horses) files, etc.) to obtain malicious TLS fingerprints, specifically, TLS fingerprints include MD5 and other hash values.
[0078] S104. Perform source tracing acc...
Embodiment 2
[0084] Please see figure 2 , figure 2 It is a schematic flowchart of another method for detecting a compromised host provided in the embodiment of the present application. Such as figure 2 As shown, wherein, the compromised host detection method includes:
[0085] S201. Obtain communication traffic to be detected.
[0086] S202. Analyze and process the communication traffic by using a communication fingerprint extraction algorithm to obtain fingerprint information, where the fingerprint information includes a client communication fingerprint and a server communication fingerprint for encrypted communication.
[0087] In this embodiment of the present application, the encrypted communication may specifically be TLS encrypted communication, and the communication fingerprint may specifically be a TLS fingerprint, which is not limited in this embodiment of the present application.
[0088] In this embodiment of the application, the TLS fingerprint extraction module can be u...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


