Web page wooden horse detecting method based on behavior characteristic

A technology of web page Trojan horse and detection method, applied in the field of computer security

Inactive Publication Date: 2007-03-07
BEIJING INSTITUTE OF TECHNOLOGYGY
View PDF0 Cites 31 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

With the emergence of new vulnerabilities, new webpage Trojans will be generate

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Web page wooden horse detecting method based on behavior characteristic

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0023] The overall process of the webpage Trojan detection method based on behavior characteristics proposed by the present invention is shown in FIG. 1. First, you need to use a browser program to browse the web page to be detected, that is, use the browser program to run the code of the web page to be detected. Trojan horse program is also a kind of virus, so the Trojan horse must also be a program that can be run, and the Trojan horse program hidden in the webpage code can only be activated and run after the webpage is run with a browser. Only when the Trojan horse program hidden in the webpage code is running, can the process change be observed through the process monitoring program.

[0024] After using the browser program to open the web page to be detected, immediately run the process monitoring program to monitor the changes of the process, and observe whether there is a new process in the process list. You can notify whether a new process is generated by passing a message...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

This invention uses browser to check Troy virus wed belonging to computer safety field, which realizes rapid and accurate checking on web Troy web through system process adjusting and memory change. This invention basic principle must generate one new process browser when checking hidden Troy virus through rapid checking on the web through system monitoring to solve the virus web to provide user with safe net environment.

Description

Technical field [0001] The patent of the invention belongs to the field of computer security. It mainly uses a browser to browse webpages containing Trojan horse programs, and through behaviors such as system process scheduling and memory changes, it can quickly and accurately detect whether a webpage contains Trojan horses, thereby solving the problem of fast speed of harmful webpages in the network. Detection, to provide a safe network environment for Internet users. Background technique [0002] Computer viruses, Trojan horses, spyware and malicious codes are the most important security threats to computer networks in recent years. In addition to spam emails, there is another important way of spreading computer viruses, Trojans, spyware and malicious codes, which is to use specially constructed webpages to spread viruses and Trojans to the computers of users who visit the webpages. This kind of webpage mainly uses various loopholes in the operating system, browser, plug-...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06G06F17/30G06F21/00G06F21/56
Inventor 陶然李志勇王越张昊杜华
Owner BEIJING INSTITUTE OF TECHNOLOGYGY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products