CN103957205A - Trojan horse detection method based on terminal traffic - Google Patents
Trojan horse detection method based on terminal traffic Download PDFInfo
- Publication number
- CN103957205A CN103957205A CN201410169874.XA CN201410169874A CN103957205A CN 103957205 A CN103957205 A CN 103957205A CN 201410169874 A CN201410169874 A CN 201410169874A CN 103957205 A CN103957205 A CN 103957205A
- Authority
- CN
- China
- Prior art keywords
- traffic
- data
- terminal
- trojan
- method based
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Landscapes
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
Description
Claims (6)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410169874.XA CN103957205A (en) | 2014-04-25 | 2014-04-25 | Trojan horse detection method based on terminal traffic |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410169874.XA CN103957205A (en) | 2014-04-25 | 2014-04-25 | Trojan horse detection method based on terminal traffic |
Publications (1)
Publication Number | Publication Date |
---|---|
CN103957205A true CN103957205A (en) | 2014-07-30 |
Family
ID=51334431
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410169874.XA Pending CN103957205A (en) | 2014-04-25 | 2014-04-25 | Trojan horse detection method based on terminal traffic |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103957205A (en) |
Cited By (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104540161A (en) * | 2014-12-12 | 2015-04-22 | 大唐移动通信设备有限公司 | Node state detection method and device |
CN105429973A (en) * | 2015-11-10 | 2016-03-23 | 浪潮(北京)电子信息产业有限公司 | Network card flow monitoring method and device |
CN105488404A (en) * | 2014-12-23 | 2016-04-13 | 哈尔滨安天科技股份有限公司 | Method and system for preventing data from being stolen by backdoor |
WO2016150313A1 (en) * | 2015-03-20 | 2016-09-29 | 阿里巴巴集团控股有限公司 | Method and apparatus for detecting suspicious process |
CN105991587A (en) * | 2015-02-13 | 2016-10-05 | 中国移动通信集团山西有限公司 | Intrusion detection method and system |
CN106506527A (en) * | 2016-12-05 | 2017-03-15 | 国云科技股份有限公司 | A kind of method of the defence connectionless flood attacks of UDP |
CN107683597A (en) * | 2015-06-04 | 2018-02-09 | 思科技术公司 | Network behavior data collection and analysis for abnormality detection |
CN107733873A (en) * | 2017-09-19 | 2018-02-23 | 北京北信源软件股份有限公司 | A kind of viral early warning system and method |
CN108337216A (en) * | 2017-03-31 | 2018-07-27 | 北京安天网络安全技术有限公司 | A kind of sextuple space traffic security analysis model generation method and system |
CN108337217A (en) * | 2017-03-31 | 2018-07-27 | 北京安天网络安全技术有限公司 | Wooden horse based on sextuple space flow analysis model returns joint inspection examining system and method |
CN111130952A (en) * | 2019-12-31 | 2020-05-08 | 南京煌和信息技术有限公司 | Integrated multi-client distributed network monitoring system through SDN network architecture |
CN111865910A (en) * | 2020-06-09 | 2020-10-30 | 北京邮电大学 | Method for detecting and positioning application malicious code |
WO2022252609A1 (en) * | 2021-05-31 | 2022-12-08 | 三六零科技集团有限公司 | Plug-in protection method and apparatus, and device and storage medium |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090158430A1 (en) * | 2005-10-21 | 2009-06-18 | Borders Kevin R | Method, system and computer program product for detecting at least one of security threats and undesirable computer files |
CN101557327A (en) * | 2009-03-20 | 2009-10-14 | 扬州永信计算机有限公司 | Intrusion detection method based on support vector machine (SVM) |
CN101567884A (en) * | 2009-05-26 | 2009-10-28 | 西北工业大学 | Method for detecting network theft Trojan |
CN102750482A (en) * | 2012-06-20 | 2012-10-24 | 东南大学 | Detection method for repackage application in android market |
-
2014
- 2014-04-25 CN CN201410169874.XA patent/CN103957205A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090158430A1 (en) * | 2005-10-21 | 2009-06-18 | Borders Kevin R | Method, system and computer program product for detecting at least one of security threats and undesirable computer files |
CN101557327A (en) * | 2009-03-20 | 2009-10-14 | 扬州永信计算机有限公司 | Intrusion detection method based on support vector machine (SVM) |
CN101567884A (en) * | 2009-05-26 | 2009-10-28 | 西北工业大学 | Method for detecting network theft Trojan |
CN102750482A (en) * | 2012-06-20 | 2012-10-24 | 东南大学 | Detection method for repackage application in android market |
Non-Patent Citations (1)
Title |
---|
彭国军,王泰格,邵玉如,刘梦冷: "基于网络流量特征的未知木马检测技术及其实现", 《信息网络安全》 * |
Cited By (19)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104540161B (en) * | 2014-12-12 | 2018-01-26 | 大唐移动通信设备有限公司 | A kind of node state detection method and device |
CN104540161A (en) * | 2014-12-12 | 2015-04-22 | 大唐移动通信设备有限公司 | Node state detection method and device |
CN105488404B (en) * | 2014-12-23 | 2019-01-15 | 哈尔滨安天科技股份有限公司 | A kind of method and system for preventing data from being stolen by back door |
CN105488404A (en) * | 2014-12-23 | 2016-04-13 | 哈尔滨安天科技股份有限公司 | Method and system for preventing data from being stolen by backdoor |
CN105991587A (en) * | 2015-02-13 | 2016-10-05 | 中国移动通信集团山西有限公司 | Intrusion detection method and system |
CN105991587B (en) * | 2015-02-13 | 2019-10-15 | 中国移动通信集团山西有限公司 | A kind of intrusion detection method and system |
WO2016150313A1 (en) * | 2015-03-20 | 2016-09-29 | 阿里巴巴集团控股有限公司 | Method and apparatus for detecting suspicious process |
CN107683597A (en) * | 2015-06-04 | 2018-02-09 | 思科技术公司 | Network behavior data collection and analysis for abnormality detection |
CN105429973A (en) * | 2015-11-10 | 2016-03-23 | 浪潮(北京)电子信息产业有限公司 | Network card flow monitoring method and device |
CN106506527B (en) * | 2016-12-05 | 2019-06-21 | 国云科技股份有限公司 | A method of the defence connectionless flood attack of UDP |
CN106506527A (en) * | 2016-12-05 | 2017-03-15 | 国云科技股份有限公司 | A kind of method of the defence connectionless flood attacks of UDP |
CN108337217A (en) * | 2017-03-31 | 2018-07-27 | 北京安天网络安全技术有限公司 | Wooden horse based on sextuple space flow analysis model returns joint inspection examining system and method |
CN108337216A (en) * | 2017-03-31 | 2018-07-27 | 北京安天网络安全技术有限公司 | A kind of sextuple space traffic security analysis model generation method and system |
CN108337216B (en) * | 2017-03-31 | 2020-02-07 | 北京安天网络安全技术有限公司 | Six-dimensional space flow safety analysis model generation method and system |
CN108337217B (en) * | 2017-03-31 | 2020-04-24 | 北京安天网络安全技术有限公司 | Trojan back-connection detection system and method based on six-dimensional space flow analysis model |
CN107733873A (en) * | 2017-09-19 | 2018-02-23 | 北京北信源软件股份有限公司 | A kind of viral early warning system and method |
CN111130952A (en) * | 2019-12-31 | 2020-05-08 | 南京煌和信息技术有限公司 | Integrated multi-client distributed network monitoring system through SDN network architecture |
CN111865910A (en) * | 2020-06-09 | 2020-10-30 | 北京邮电大学 | Method for detecting and positioning application malicious code |
WO2022252609A1 (en) * | 2021-05-31 | 2022-12-08 | 三六零科技集团有限公司 | Plug-in protection method and apparatus, and device and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103957205A (en) | Trojan horse detection method based on terminal traffic | |
CN104811447B (en) | One kind is based on the associated safety detection method of attack and system | |
CN103428196B (en) | A kind of WEB application intrusion detection method based on URL white list | |
CN105471882A (en) | Behavior characteristics-based network attack detection method and device | |
CN105024976B (en) | A kind of advanced constant threat attack recognition method and device | |
CN103607413B (en) | Method and device for detecting website backdoor program | |
CN103428183B (en) | Method and device for identifying malicious website | |
CN102467633A (en) | Method and system for safely browsing webpage | |
CN104008332A (en) | Intrusion detection system based on Android platform | |
JP6174520B2 (en) | Malignant communication pattern detection device, malignant communication pattern detection method, and malignant communication pattern detection program | |
WO2021017318A1 (en) | Cross-site scripting attack protection method and apparatus, device and storage medium | |
CN108183888A (en) | A kind of social engineering Network Intrusion path detection method based on random forests algorithm | |
CN105260662A (en) | Detection device and method of unknown application bug threat | |
CN110392013A (en) | A kind of Malware recognition methods, system and electronic equipment based on net flow assorted | |
KR101692982B1 (en) | Automatic access control system of detecting threat using log analysis and automatic feature learning | |
CN106549980A (en) | A kind of malice C&C server determines method and device | |
CN108989294A (en) | A kind of method and system for the malicious user accurately identifying website visiting | |
CN106357637A (en) | Active defense system in allusion to smart energy terminal data | |
CN107426159A (en) | APT based on big data analysis monitors defence method | |
CN103955644B (en) | A kind of static Trojan detecting method based on terminal self-starting | |
KR101535529B1 (en) | Method for collecting the suspicious file and trace information to analysis the ATP attack | |
Wang et al. | TextDroid: Semantics-based detection of mobile malware using network flows | |
Vast et al. | Artificial intelligence based security orchestration, automation and response system | |
CN108040036A (en) | A kind of industry cloud Webshell safety protecting methods | |
CN104978523A (en) | Malicious sample capture method and system based on network hot word recognition |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C41 | Transfer of patent application or patent right or utility model | ||
TA01 | Transfer of patent application right |
Effective date of registration: 20160425 Address after: 100031 Xicheng District West Chang'an Avenue, No. 86, Beijing Applicant after: State Grid Corporation of China Applicant after: China Electric Power Research Institute Applicant after: State Grid Smart Grid Institute Address before: 100031 Xicheng District West Chang'an Avenue, No. 86, Beijing Applicant before: State Grid Corporation of China Applicant before: China Electric Power Research Institute |
|
CB02 | Change of applicant information |
Address after: 100031 Xicheng District West Chang'an Avenue, No. 86, Beijing Applicant after: State Grid Corporation of China Applicant after: China Electric Power Research Institute Applicant after: GLOBAL ENERGY INTERCONNECTION RESEARCH INSTITUTE Address before: 100031 Xicheng District West Chang'an Avenue, No. 86, Beijing Applicant before: State Grid Corporation of China Applicant before: China Electric Power Research Institute Applicant before: State Grid Smart Grid Institute |
|
COR | Change of bibliographic data | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20140730 |
|
RJ01 | Rejection of invention patent application after publication |