Web page wooden horse detecting method based on behavior characteristic
A technology of web page Trojan horse and detection method, applied in the field of computer security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example Embodiment
[0023] The overall process of the webpage Trojan detection method based on behavior characteristics proposed by the present invention is shown in FIG. 1. First, you need to use a browser program to browse the web page to be detected, that is, use the browser program to run the code of the web page to be detected. Trojan horse program is also a kind of virus, so the Trojan horse must also be a program that can be run, and the Trojan horse program hidden in the webpage code can only be activated and run after the webpage is run with a browser. Only when the Trojan horse program hidden in the webpage code is running, can the process change be observed through the process monitoring program.
[0024] After using the browser program to open the web page to be detected, immediately run the process monitoring program to monitor the changes of the process, and observe whether there is a new process in the process list. You can notify whether a new process is generated by passing a message...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap