Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

94 results about "Zombie" patented technology

In computing, a zombie is a computer connected to the Internet that has been compromised by a hacker, computer virus or trojan horse program and can be used to perform malicious tasks of one sort or another under remote direction. Botnets of zombie computers are often used to spread e-mail spam and launch denial-of-service attacks (DOS attacks). Most owners of "zombie" computers are unaware that their system is being used in this way. Because the owner tends to be unaware, these computers are metaphorically compared to fictional zombies. A coordinated DDoS attack by multiple botnet machines also resembles a "zombie horde attack", as depicted in fictional zombie films.

Cross-layer cooperative detection method of DDoS attack based on software defined network

The invention discloses a cross-layer cooperative detection method of a DDoS attack based on an SDN for improving the detection efficiency of the DDoS attack. The technical scheme is as follows: constructing cross-layer collaborative detection architecture based on the SDN composed of a data layer and a control layer, wherein a data path, a switch proxy, a DDoS attack sensing module and a featureextraction module are arranged on an SDN switch of the data layer; and a controller proxy, an event manager, a DDoS attack classification module and a botnet tracing module are arranged on an SND controller of the control layer. The data layer performs coarse granularity detection on the data traffic to obtain DDoS attack abnormal traffic data, and the control layer performs fine-grained detectionon the abnormal traffic data of the DDoS attack. According to the cross-layer cooperative detection method disclosed by the invention, by means of the cooperation of the data layer and the control layer, the problems of large southbound interface pressure of the SDN and overlarge pressure of the SND controller are solved, the type of DDoS attack can be detected, and a switch set close to a botnetcan also be detected, so that the speed and accuracy of detecting the DDoS attack are improved.
Owner:NAT UNIV OF DEFENSE TECH

Detection method and detection device of zombie host computers

The invention provides a detection method and a detection device of zombie host computers. The detection method of the zombie host computers includes the following steps: email flow information of each to-be-detected host computer in the network is obtained within set time; according to the obtained email flow information, internet protocol (IP) addresses according with preset conditions are selected, and a possibility measuring value of each to-be-detected host computer corresponding to each of the selected IP addresses is calculated out; and the calculated out possibility measuring value of each IP addresses is judged whether to be lager than a fourth threshold in sequence, and under the condition of 'yes', the to-be-detected host computers corresponding to the IP addresses are determined as the zombie host computers. According to the detection method and the detection device of the zombie host computers, the email flow information of the to-be-detected host computers can be periodically obtained, and the detection method is relatively timely. Besides, after the email flow information is processed according to the preset conditions, the high-possibility IP addresses of the zombie host computers can be obtained, the zombie host computers in the network can be obtained after processed with a certain algorithm, and the detection efficiency and the accuracy are improved.
Owner:NSFOCUS INFORMATION TECHNOLOGY CO LTD +1

Zombie network control node detection method and device

ActiveCN109962898AEnable Threat Intelligence Situational AwarenessImprove detection efficiencyTransmissionNetwork controlBotnet
The invention discloses a zombie network control node detection method and device, and the method comprises the steps: generating a high-frequency network segment according to the IP of a current zombie network control node, so as to rapidly locate the position of a suspicious network control node; obtaining an initial suspicious network control node set according to the current state of the portof the high-frequency network segment IP, and obtaining a suspicious network control node list with a preset common port list; filtering according to the suspicious network control node list to obtaina high suspicious network control node list; performing matching and protocol detection according to the highly suspicious network control node list and the port list of the zombie network family; performing protocol verification on the highly suspicious network control nodes in the highly suspicious network control node list according to the classification result; and obtaining the network control node of the corresponding zombie network family according to the family protocol. The method accelerates automatic active analysis and detection of zombie network control nodes, detects more unknown zombie network control nodes, improves the detection efficiency, and improves the scanning efficiency.
Owner:HARBIN ANTIY TECH

Method and system for preventing DDOS (Distributed Denial of Service) attack of zombie terminal

The invention discloses a method and a system for preventing DDOS (Distributed Denial of Service) attack of a zombie terminal. The method comprises the steps that an HSS server receives and records a network bearing request initiated by a terminal, obtains a corresponding HSS error code and state information of the terminal, judges whether the terminal meets a preset number card judgment condition or not, and defines the terminal as a zombie terminal if the terminal meets the preset number card judgment condition; after the terminal is judged to be a zombie terminal, the HSS server obtains an IMEI code of the terminal and sends the IMEI code to the connection management platform; the connection management platform issues a communication function closing instruction to the Internet of Things card of the terminal; and the Internet of Things card executes the received communication function closing instruction, closes the communication function of the terminal, and returns a closing result, so that the connection management platform executes disassembly or shutdown processing on the Internet of Things card. According to the method, the zombie terminal is automatically found fundamentally, the operation of closing the communication function module is carried out on the zombie terminal, the problem that the zombie terminal initiates the DDOS attack is thoroughly solved, and the communication success rate of the area is remarkably improved.
Owner:E SURFING IOT CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products