Summary of the invention
To solve the above-mentioned problems, the present invention provides a kind of remote control class wooden horse sweep-out method and device, pass through go-between
Attack method simulates main control end and sends destruction instruction to the wooden horse of controlled terminal, achievees the purpose that thoroughly remove trojan horse program.
The technical solution is as follows:
In a first aspect, providing a kind of remote control class wooden horse sweep-out method, which is characterized in that the described method includes:
Obtain at least one data packet in network flow;
At least one described data packet is matched according to preset communication feature rule base, the data hit
Packet;
The flow lead of data packet including the hit to remote control class wooden horse is broken through into device;
The remote control class wooden horse counter device establishes connection simultaneously by the controlled terminal of flow re-injection and the remote control class wooden horse
It sends from destruction instruction;
The remote control class wooden horse executes destruction after receiving the instruction from destruction.
With reference to first aspect, in the first possible embodiment, described according to preset communication feature rule base
At least one described data packet is matched, before the data packet hit, the method also includes:
At least one section of bytecode is as main feature in extraction payload;
Extract at least one attributive character in network message;
Combine the main feature and the attributive character communication feature to form the remote control class wooden horse of identification.
With reference to first aspect, described according to preset communication feature rule base pair in second of possible embodiment
At least one described data packet is matched, and the data packet hit includes:
The data packet is recombinated, decompressed and is decrypted, and with the communication in the preset communication feature rule base
Feature is matched;
If communication feature is identical as the communication feature in the preset communication feature rule base in the data packet, sentence
The fixed data packet is the data packet of the hit.
With reference to first aspect, in the third possible embodiment, the stream by the data packet including the hit
Amount traction breaks through device to remote control class wooden horse
According to counter strategy, the information of the flow is obtained;
The flow lead to remote control class wooden horse is broken through into device according to the information of the flow;Wherein, the flow
Information includes any one in the remote control class wooden horse type, remote control class wooden horse version and protocol port obtained according to counter strategy
Or a variety of combination.
With reference to first aspect, in the 4th kind of possible embodiment, the remote control class wooden horse counter device passes through flow
The controlled terminal of re-injection and the remote control class wooden horse, which establishes connection and sends self-marketing and ruin instruction, includes:
The main control end of class wooden horse is far controlled described in the remote control class wooden horse counter unit simulation;
After receiving includes the flow of data packet of the hit, establish between the controlled terminal of the remote control class wooden horse
Connection;
It is sent to the controlled terminal of the remote control class wooden horse described from destruction instruction;Wherein, the remote control class wooden horse counter dress
Set the communication protocol of the main control end including at least one remote control class wooden horse, at least one remote control class wooden horse verifies online authentication
The combination of any one or more in method and the payload instructed including oneself destruction.
Second aspect provides a kind of remote control class wooden horse remove device, which is characterized in that described device includes:
Module is obtained, for obtaining at least one data packet in network flow;
Matching module is obtained for being matched according to preset communication feature rule base at least one described data packet
To the data packet of hit;
Traction module, for will include the hit data packet flow lead to remote control class wooden horse counter device;
Go-between's module passes through the quilt of flow re-injection and the remote control class wooden horse for the remote control class wooden horse counter device
Control end, which establishes connection and sends self-marketing, ruins instruction;
Module is destroyed, for executing destruction from after destroying instruction described in the remote control class wooden horse reception.
In conjunction with second aspect, in the first possible embodiment, described device further includes communication feature building module,
For:
At least one section of bytecode is as main feature in extraction payload;
Extract at least one attributive character in network message;
Combine the main feature and the attributive character communication feature to form the remote control class wooden horse of identification.
In conjunction with second aspect, in second of possible embodiment, the matching module is specifically used for:
The data packet is recombinated, decompressed and is decrypted, and with the communication in the preset communication feature rule base
Feature is matched;
If communication feature is identical as the communication feature in the preset communication feature rule base in the data packet, sentence
The fixed data packet is the data packet of the hit.
In conjunction with second aspect, in the third possible embodiment, the traction module is specifically used for:
According to counter strategy, the information of the flow is obtained;
The flow lead to remote control class wooden horse is broken through into device according to the information of the flow;Wherein, the flow
Information includes any one in the remote control class wooden horse type, remote control class wooden horse version and protocol port obtained according to counter strategy
Or a variety of combination.
In conjunction with second aspect, in the 4th kind of possible embodiment, the traction module is specifically used for:
According to counter strategy, the information of the flow is obtained;
The flow lead to remote control class wooden horse is broken through into device according to the information of the flow;Wherein, the flow
Information includes any one in the remote control class wooden horse type, remote control class wooden horse version and protocol port obtained according to counter strategy
Or a variety of combination.
The embodiment of the invention provides a kind of remote control class wooden horse sweep-out method and devices, by constructing the logical of remote control class wooden horse
Believe feature database, wooden horse data packet can be identified in flow, accuracy is high, and recognition efficiency is high;Pass through the flow lead that will be hit
To counter device, the parameter in network environment can be changed by the setting of counter device, reach real simulation main control end and arrive
Purpose;By using flow reinjection technique, simulates main control end and controlled terminal establishes connection, sold to be sent to the wooden horse of controlled terminal
Instruction is ruined, trojan horse program can be thoroughly destroyed, improves internet security.
Specific embodiment
To make the object, technical solutions and advantages of the present invention clearer, below in conjunction with attached in the embodiment of the present invention
Figure, technical scheme in the embodiment of the invention is clearly and completely described, it is clear that described embodiment is only this
Invention a part of the embodiment, instead of all the embodiments.Based on the embodiments of the present invention, those of ordinary skill in the art exist
Every other embodiment obtained under the premise of creative work is not made, shall fall within the protection scope of the present invention.
Referring to Fig. 1, a kind of remote control class wooden horse sweep-out method is provided in a preferred embodiment, and especially one kind is based on
The remote control class wooden horse sweep-out method of network side flow reinjection technique, wherein flow reinjection technique can be any way, including but
It is not limited to following: policybased routing, MPLS VPN, two layers of transparent transmission and dual link etc..Specifically include following methods:
At least one data packet in S101, acquisition network flow.
Specifically, the data packet in network flow is acquired using flow collection equipment DPI.In a complete net
In network communication, communicated in the form of session between main control end and controlled terminal, request packet and response bag including transmitting-receiving.
The collected data packet of DPI can be request packet and be also possible to response bag, can be general data packet and is also possible to wooden horse communication
Data packet.
S102, the preset communication feature rule base of building.
Specifically, extract payload data payload at least one section of bytecode as main feature;
Extract at least one attributive character in network message;
Combine main feature and attributive character the communication feature to form the remote control class wooden horse of identification.
Wherein, the attributive character of network message includes: size, agreement, the five-tuple restriction of data packet, request packet/response
Any one or more combinations in packet restriction and time interval etc..
Wherein, payload data payload is obtained by the communication protocol of analysis, the remote control class wooden horse of decryption.
By having merged remote control for the communication feature of the specific remote control class wooden horse of the combination building of main feature and attributive character
The data characteristics of class wooden horse and the data characteristics of network message can far be controlled class wooden horse with unique identification and identify the net where wooden horse
Network environment.Data arrangement and location mode in communication feature are referred to data arrangement and storage side in general data packet
Formula is not specifically limited herein.In the communication feature rule base of building, the combination of communication feature can with any combination,
It, can be by multiple communication features come characterized and identification for complicated wooden horse communication feature.
Optionally, S102 can be after S101, can also be before S101, and execution sequence is not specifically limited.
S103, at least one data packet is matched according to preset communication feature rule base, the data hit
Packet.
Specifically, data packet recombinated, decompressed and is decrypted, and with the communication special in preset communication feature rule base
Sign is matched;
It, will be logical in obtained data information and communication feature rule base after being recombinated, decompressed and being decrypted to data packet
Letter feature is successively matched.Optionally, in order to improve matched efficiency, can first matching network message attributive character, to
After determination, main feature is being matched item by item.
If communication feature is identical as the communication feature in preset communication feature rule base in data packet, data packet is determined
For the data packet of hit.Otherwise, terminate the execution of this method.
Wherein, the data packet of hit is the wooden horse data packet comprising communication feature.
S104, the flow lead of the data packet including hit to remote control class wooden horse is broken through into device.
Specifically, according to counter strategy, the information of flow is obtained;
Flow lead to remote control class wooden horse is broken through into device according to the information of flow;Wherein, the information of flow includes basis
The group of any one or more in remote control class wooden horse type, remote control class wooden horse version and protocol port that counter strategy obtains
It closes.
Wherein, the flow hit in S103 can identify remote control class wooden horse type, remote control after recombination, decompression and decryption
Class wooden horse version and protocol port formulate counter strategy according to obtained above- mentioned information, thus by the flow lead of above-mentioned hit
To the corresponding ports of wooden horse counter device.
S105, remote control class wooden horse counter device are established connection by the controlled terminal of flow re-injection and remote control class wooden horse and are sent
It is instructed from destroying.
Specifically, far control class wooden horse breaks through the main control end that unit simulation far controls class wooden horse;
After receiving includes the flow of data packet of hit, the connection between the controlled terminal of remote control class wooden horse is established;
Instruction is destroyed certainly described in controlled terminal transmission to remote control class wooden horse;Wherein, far control class wooden horse counter device includes extremely
The few a kind of remote communication protocol of the main control end of control class wooden horse, at least one remote control class wooden horse verify online verification method and including
The combination of any one or more from the payload for destroying instruction.
Remote control class wooden horse counter device includes hardware device and software environment, can pass through software mould in terms of software environment
Intend a variety of known remote control class wooden horse main control end section communication agreements, and pre-sets the online verification method of a variety of logins
With from destroy instruction payload, when receive by flow lead come hit flow after, can simulate far control class wooden horse
Main control end actively establishes the connection with controlled terminal to network parameter real time modifying.Connection is established in simulation main control end and controlled terminal
Process nature be the process for initiating man-in-the-middle attack, be different from blocking technology and beeswax technology to remote control class wooden horse main control end
Adapter tube, man-in-the-middle attack is using directly establishing connection with controlled terminal.After simulation main control end and controlled terminal establish connection, far
Control class wooden horse counter device can be sent to controlled terminal from destruction instruction for preset.
S106, remote control class wooden horse execute destruction after instructing received from destruction.
Operate in controlled terminal remote control class wooden horse receive transmission from destroy instruction after, execute from destroy task, thoroughly
Destroy the trojan horse program of operation.Backstage is run in Destruction, does not influence the normal display and operation of controlled end equipment.
A kind of remote control class wooden horse sweep-out method provided in an embodiment of the present invention, by the communication feature for constructing remote control class wooden horse
Library can identify wooden horse data packet in flow, and accuracy is high, and recognition efficiency is high;It is extremely broken through by the flow lead that will be hit
Device can change the parameter in network environment by the setting of counter device, reach real simulation main control end to purpose;It is logical
It crosses using flow reinjection technique, simulation main control end and controlled terminal establish connection, instruction is destroyed to send to the wooden horse of controlled terminal,
Trojan horse program can be thoroughly destroyed, internet security is improved.
Referring to shown in Fig. 2, in another preferred embodiment of the present invention, a kind of remote control class wooden horse remove device is provided,
The device includes:
Module 201 is obtained, for obtaining at least one data packet in network flow;Specifically, it is set using flow collection
Standby DPI obtains at least one data packet in network flow.
Matching module 202 is obtained for being matched according to preset communication feature rule base at least one data packet
The data packet of hit.
Traction module 203, flow lead to the remote control class wooden horse for that will include the data packet hit break through device.
Go-between's module 204 passes through the controlled terminal of flow re-injection and remote control class wooden horse for far controlling class wooden horse counter device
It establishes connection and sends self-marketing and ruin instruction.
Destruction module 205 executes destruction for far controlling after class wooden horse is instructed received from destruction.
Wherein, which further includes communication feature building module 206, is used for:
At least one section of bytecode is as main feature in extraction payload;
Extract at least one attributive character in network message;
Combine main feature and attributive character the communication feature to form the remote control class wooden horse of identification.
Specifically, matching module 202 is specifically used for:
Data packet is recombinated, decompressed and is decrypted, and is carried out with the communication feature in preset communication feature rule base
Matching;
If communication feature is identical as the communication feature in preset communication feature rule base in data packet, data packet is determined
For the data packet of hit.
Specifically, traction module 203 is specifically used for:
According to counter strategy, the information of flow is obtained;
Flow lead to remote control class wooden horse is broken through into device according to the information of flow;Wherein, the information of flow includes basis
The group of any one or more in remote control class wooden horse type, remote control class wooden horse version and protocol port that counter strategy obtains
It closes.
Go-between's module 204 is specifically used for:
The main control end of remote control class wooden horse counter the controlled class wooden horse of unit simulation;
After receiving includes the flow of data packet of hit, the connection between the controlled terminal of remote control class wooden horse is established;
It sends to the controlled terminal of remote control class wooden horse from destruction instruction.
Wherein, far control class wooden horse counter device include at least one remote control class wooden horse main control end communication protocol, at least
A kind of remote control class wooden horse verifies online verification method and including any one from the payload for destroying instruction or more
The combination of kind.
The embodiment of the invention provides a kind of remote control class wooden horse remove device, communication feature building module 206 passes through building
The communication feature library of remote control class wooden horse, can identify wooden horse data packet in flow, and accuracy is high, and recognition efficiency is high;Draw mould
Block 203 passes through the flow lead of hit to device is broken through, and can be changed in network environment by the setting of counter device
Parameter reaches real simulation main control end to purpose;Man-in-the-middle attack module 204 simulates master control by using flow reinjection technique
Connection is established with controlled terminal in end, destroys instruction to send to the wooden horse of controlled terminal, destroys module 205 and picks above-mentioned destruction instruction
After can thoroughly destroy trojan horse program, improve internet security.
It should be understood that the embodiment is only with the division progress of each functional module for example, practical application
In, it can according to need and be completed by different functional modules the function distribution, i.e., be divided into the internal structure of device
Different functional modules, to complete all or part of the functions described above.In addition, the remote control class wood that the embodiment provides
Horse sweep-out method and device belong to same design, implement process detailed in Example, which is not described herein again.
The foregoing is merely presently preferred embodiments of the present invention, is not intended to limit the invention, it is all in spirit of the invention and
Within principle, any modification, equivalent replacement, improvement and so on be should all be included in the protection scope of the present invention.