Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

File-free Trojan searching and killing method and device

A Trojan killing, file technology, applied in the field of information security, to achieve the effect of improving accuracy, ensuring safe operation, and precise strike

Pending Publication Date: 2022-02-18
INDUSTRIAL AND COMMERCIAL BANK OF CHINA
View PDF0 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, there is no effective killing method that can accurately locate and kill fileless Trojans

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • File-free Trojan searching and killing method and device
  • File-free Trojan searching and killing method and device
  • File-free Trojan searching and killing method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0058]The following will clearly and completely describe the technical solutions in the embodiments of the application with reference to the drawings in the embodiments of the application. Apparently, the described embodiments are only some, not all, embodiments of the application. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the scope of protection of this application.

[0059] It should be noted that the fileless Trojan horse killing method and device provided by this application can be used in the financial field, and can also be used in any field other than the financial field. The application field of the fileless Trojan horse killing method and device provided by this application No limit.

[0060] For an example, see figure 1 In order to realize automatic detection and killing of fileless Trojan horses and protect the safe operation of Web applications, thi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a file-free Trojan searching and killing method and device, and relates to the field of information security. The method can also be used in the financial field, and comprises the following steps: running a Java Agent engine and obtaining a stack calling log and byte-like code information of a called program in a Web server application program; determining the risk level of the called program according to a preset detection rule, the stack calling log and the byte-like code information; and according to a preset searching and killing strategy and the risk level, determining that the called program contains a class file without the file Trojan horse, and searching and killing the class file without the file Trojan horse. According to the method and the device, automatic detection, searching and killing without file Trojan can be realized, and safe operation of the Web application is protected.

Description

technical field [0001] This application relates to the field of information security and can be used in the financial field, specifically a method and device for checking and killing a fileless Trojan horse. Background technique [0002] A fileless attack is an attack strategy that avoids storing malicious files on disk to evade detection by traditional security software. Among them, a fileless Trojan horse (also called a memory horse) is a common technical means of a fileless attack, which refers to writing malicious codes such as a backdoor or a Trojan horse in the memory and executing them, so as to achieve the purpose of remotely controlling the Web server. Since traditional web shells are designed based on file types, attackers can upload Trojan horses with files through tools or exploit vulnerabilities, and complete Trojan horse implantation for Internet open websites or applications in enterprises. Compared with the above-mentioned traditional Trojan implantation met...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/56H04L9/40
CPCG06F21/568H04L63/145
Inventor 钱维正旷亚和叶红苏建明
Owner INDUSTRIAL AND COMMERCIAL BANK OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products