CN108810028A - A kind of detection method and system of the whole network wooden horse control terminal - Google Patents

A kind of detection method and system of the whole network wooden horse control terminal Download PDF

Info

Publication number
CN108810028A
CN108810028A CN201810809216.0A CN201810809216A CN108810028A CN 108810028 A CN108810028 A CN 108810028A CN 201810809216 A CN201810809216 A CN 201810809216A CN 108810028 A CN108810028 A CN 108810028A
Authority
CN
China
Prior art keywords
remote control
trojan
control terminal
target
doubtful
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810809216.0A
Other languages
Chinese (zh)
Inventor
王世晋
范渊
史光庭
郑威
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Dbappsecurity Technology Co Ltd
Original Assignee
Hangzhou Dbappsecurity Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Dbappsecurity Technology Co Ltd filed Critical Hangzhou Dbappsecurity Technology Co Ltd
Priority to CN201810809216.0A priority Critical patent/CN108810028A/en
Publication of CN108810028A publication Critical patent/CN108810028A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/145Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Virology (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The present invention provides a kind of detection methods and system of the whole network wooden horse control terminal, are related to field of information security technology, and the detection method of the whole network wooden horse control terminal includes:Receive the object to be measured network segment input by user;Port scan is carried out to all targets to be detected of target network section to be measured, to determine doubtful detection target according to scanning result;Doubtful detection target is detected using the remote control Trojan exploration policy of pre-configuration, whether is remote control Trojan control terminal with the doubtful detection target of determination.The present invention under network environment it can be found that remote control Trojan control terminal and understand its distribution situation, degree of being beneficial for improving user experience, alleviating in the prior art can not be to the discovery demand of remote control Trojan control terminal distribution situation under network environment, the technical problem for causing user experience not high.

Description

A kind of detection method and system of the whole network wooden horse control terminal
Technical field
The present invention relates to field of information security technology, more particularly, to a kind of detection method of the whole network wooden horse control terminal be System.
Background technology
Remote control Trojan is the common attacker of hacker, and information security is the discovery that the distributed awareness of remote control Trojan control terminal The important action in one, field must threaten intelligence value with very high.
It is that wood is perceived by way of flow monitoring mostly in the method that existing remote control Trojan threatens information to obtain The upper line process of horse is matched in advance for example, by corporate intranet, private network Intranet or the other traffic mirroring of carrier-class and monitoring Known remote control Trojan is set to reach the standard grade the information such as domain name, IP, when occurring being communicated with these sensitivity hosts in network flow, Inform that user has been infected.Due to this method be only capable of monitoring the wooden horse within the scope of finite region activity, can not solve how It was found that under network environment remote control Trojan control terminal distribution problem.
In another method, the control terminal network address mainly by knowing remote control Trojan to the analysis of malice sample. For example, being analyzed capture sample by means such as sample, honey jars, so that it is determined that the network address of remote control Trojan control terminal. Obvious this method also cannot be satisfied only with the traditional analysis means of the analysis to malice sample to remote control Trojan under network environment The discovery demand of control terminal distribution situation.
In view of the above problems, currently no effective solution has been proposed.
Invention content
In view of this, the purpose of the present invention is to provide a kind of detection method and system of the whole network wooden horse control terminal, with slow The discovery demand existing in the prior art that cannot be satisfied to remote control Trojan control terminal distribution situation under network environment has been solved, has been caused The not high technical problem of user experience.
In a first aspect, an embodiment of the present invention provides a kind of detection methods of the whole network wooden horse control terminal, including:
Receive the object to be measured network segment input by user;
Port scan is carried out to all targets to be detected of the object to be measured network segment, it is doubtful to be determined according to scanning result Detect target;
The doubtful detection target is detected using the remote control Trojan exploration policy of pre-configuration, it is described doubtful with determination Detect whether target is remote control Trojan control terminal.
With reference to first aspect, an embodiment of the present invention provides the first possible embodiments of first aspect, wherein institute It states and port scan is carried out to all targets to be detected of the object to be measured network segment, obtain doubtful detection target, including:
Port scan is carried out to the target to be detected;
Extract the response data that the target to be detected carries out the port of the opening got after port scan;
Judge that the port of the opening whether there is remote control Trojan control terminal fingerprint according to the response data;
If so, being the doubtful inspection there will be the target label to be detected belonging to the port of remote control Trojan control terminal fingerprint Survey target.
The possible embodiment of with reference to first aspect the first, an embodiment of the present invention provides second of first aspect Possible embodiment, wherein the remote control Trojan exploration policy of the pre-configuration is multiple;
It is described that the doubtful detection target is detected using the remote control Trojan exploration policy being pre-configured, described in determination Whether doubtful detection target is remote control Trojan control terminal, including:
The doubtful detection target is detected using the remote control Trojan exploration policy of each pre-configuration, with determination Whether the doubtful detection target is remote control Trojan control terminal.
Second of possible embodiment with reference to first aspect, an embodiment of the present invention provides the third of first aspect Possible embodiment, wherein the remote control Trojan exploration policy using each pre-configuration is to the doubtful detection mesh Whether mark is detected, be remote control Trojan control terminal with the determination doubtful detection target, including:
Exploration policy included in remote control Trojan exploration policy according to each pre-configuration is to the doubtful detection Target sends probe messages, and obtains the feedback information that the doubtful detection target is sent based on the probe messages;
Judge to preset feedback information included in remote control Trojan exploration policy of the feedback information with the pre-configuration It is whether consistent;
If consistent, confirm that the doubtful detection target is remote control Trojan control terminal.
With reference to first aspect, an embodiment of the present invention provides the 4th kind of possible embodiments of first aspect, wherein institute The method of stating further includes:
When it is remote control Trojan control terminal to determine the doubtful detection target, the remote control Trojan exploration policy is extracted to institute State the detection information in doubtful detection target progress detection process;The detection information include it is doubtful detection target IP address, Port numbers, remote control Trojan type, detection time.
With reference to first aspect, an embodiment of the present invention provides the 5th kind of possible embodiments of first aspect, wherein institute The method of stating further includes:
Using be pre-configured remote control Trojan exploration policy to all doubtful detection targets in the target to be detected into Row detection, after determining whether all doubtful detection targets are remote control Trojan control terminal according to interaction results, based on institute State the doubtful detection target generation distribution results for being confirmed as remote control Trojan control terminal in the object to be measured network segment, wherein institute Distribution results are stated for analyzing the security risk trend of the object to be measured network segment.
With reference to first aspect, an embodiment of the present invention provides the 6th kind of possible embodiments of first aspect, wherein institute The method of stating further includes:
The remote control Trojan exploration policy is pre-configured.
Second aspect, the embodiment of the present invention also provide a kind of detection system of the whole network wooden horse control terminal, including:
Receiving module, for receiving the object to be measured network segment input by user;
Scan module is carried out port scan for all targets to be detected to the object to be measured network segment, is swept with basis It retouches result and determines doubtful detection target;
Detecting module detects the doubtful detection target for the remote control Trojan exploration policy using pre-configuration, Whether it is remote control Trojan control terminal with the determination doubtful detection target.
In conjunction with second aspect, an embodiment of the present invention provides the first possible embodiments of second aspect, wherein institute Scan module is stated to be specifically used for:
Port scan is carried out to the target to be detected;
Extract the response data that the target to be detected carries out the port of the opening got after port scan;
Judge that the port of the opening whether there is remote control Trojan control terminal fingerprint according to the response data;
If so, being the doubtful inspection there will be the target label to be detected belonging to the port of remote control Trojan control terminal fingerprint Survey target.
In conjunction with the first possible embodiment of second aspect, an embodiment of the present invention provides second of second aspect Possible embodiment, wherein the remote control Trojan exploration policy of the pre-configuration is multiple;
The detecting module is specifically used for:
The doubtful detection target is detected using the remote control Trojan exploration policy of each pre-configuration, with determination Whether the doubtful detection target is remote control Trojan control terminal.
The third aspect, the embodiment of the present invention additionally provide a kind of electronic equipment, including memory, processor and are stored in institute The computer program that can be run on memory and on the processor is stated, the processor executes real when the computer program The step of detection method of existing above-mentioned the whole network wooden horse control terminal.
Fourth aspect, an embodiment of the present invention provides a kind of computer readable storage mediums, are stored thereon with computer journey The step of sequence, the computer program realizes the detection method of above-mentioned the whole network wooden horse control terminal when being executed by processor.
The embodiment of the present invention brings following advantageous effect:The detection of the whole network wooden horse control terminal provided in an embodiment of the present invention Method, system, electronic equipment and computer readable storage medium, wherein the detection method of the whole network wooden horse control terminal is first By receiving the object to be measured network segment input by user, such as the whole network or other specified network segments;Then in the object to be measured net Port scan is carried out to target to be detected in section, to determine doubtful detection target according to scanning result;Finally utilize pre-configuration Whether remote control Trojan exploration policy detects doubtful detection target, be remote control Trojan control with the doubtful detection target of determination End, it can be found that remote control Trojan control terminal and understanding its distribution situation under network environment, degree of being beneficial for improving user experience is alleviated In the prior art it can not lead to user experience not to the discovery demand of remote control Trojan control terminal distribution situation under network environment High technical problem.
Other features and advantages of the present invention will illustrate in the following description, also, partly become from specification It obtains it is clear that understand through the implementation of the invention.The purpose of the present invention and other advantages are in specification, claims And specifically noted structure is realized and is obtained in attached drawing.
To enable the above objects, features and advantages of the present invention to be clearer and more comprehensible, preferred embodiment cited below particularly, and coordinate Appended attached drawing, is described in detail below.
Description of the drawings
It, below will be to specific in order to illustrate more clearly of the specific embodiment of the invention or technical solution in the prior art Embodiment or attached drawing needed to be used in the description of the prior art are briefly described, it should be apparent that, in being described below Attached drawing is some embodiments of the present invention, for those of ordinary skill in the art, before not making the creative labor It puts, other drawings may also be obtained based on these drawings.
Fig. 1 is a kind of flow chart of the detection method of the whole network wooden horse control terminal provided in an embodiment of the present invention;
Fig. 2 is a kind of flow of the step S102 of the detection method of the whole network wooden horse control terminal provided in an embodiment of the present invention Figure;
Fig. 3 is the flow chart of the detection method of another the whole network wooden horse control terminal provided in an embodiment of the present invention;
Fig. 4 is a kind of application principle figure of the detection method of the whole network wooden horse control terminal provided in an embodiment of the present invention;
Fig. 5 is a kind of structure chart of the detection system of the whole network wooden horse control terminal provided in an embodiment of the present invention;
Fig. 6 is the schematic diagram of a kind of electronic equipment provided in an embodiment of the present invention.
Specific implementation mode
In order to make the object, technical scheme and advantages of the embodiment of the invention clearer, below in conjunction with attached drawing to the present invention Technical solution be clearly and completely described, it is clear that described embodiments are some of the embodiments of the present invention, rather than Whole embodiments.Based on the embodiments of the present invention, those of ordinary skill in the art are not making creative work premise Lower obtained every other embodiment, shall fall within the protection scope of the present invention.
Remote control Trojan is the common attacker of hacker, and information security is the discovery that the distributed awareness of remote control Trojan control terminal The important action in one, field must threaten intelligence value with very high.
One of prior art is:By to corporate intranet, private network Intranet or the other traffic mirroring of carrier-class and prison Control, in advance the good known remote control Trojan of configuration reach the standard grade the information such as domain name, IP, when occur in network flow with these sensitive hosts into When row communication, inform that user has been infected.
The two of prior art are:By the control terminal network address for knowing remote control Trojan to the analysis of malice sample.
But there are shortcomings for existing technical solution, it is specific as follows:
1) can only perceive in network environment has abnormal host to carry out communication activity with known remote control Trojan control terminal.
2) sensing capability is lacked to unknown remote control Trojan control terminal, when the remote control Trojan infected in network environment replaces with When the domain name of line, IP, sensing capability will be lost.
3) rate of false alarm is high, can not active perception remote control Trojan control terminal distribution.
4) each malice sample can only analyze a corresponding remote control Trojan control terminal network address, cannot be satisfied to complete The discovery demand of net remote control Trojan control terminal distribution situation.
Based on this, a kind of detection method and system of the whole network wooden horse control terminal provided in an embodiment of the present invention can be alleviated Or part alleviate it is above-mentioned can not active perception remote control Trojan control terminal distribution, lead to the technical problem that user experience is poor.
Term remote control Trojan is briefly described first below:
Remote control technology is a kind of technology controlled operating system using network remote, remote control Trojan here Refer to the trojan horse program that hacker has used for reference that traditional remote control technology making controls other people computers for unauthorized remote, when aggrieved After person infects trojan horse program, " reaching the standard grade " contact can be actively carried out with control terminal.
For ease of understanding the present embodiment, first to a kind of the whole network wooden horse control terminal disclosed in the embodiment of the present invention Detection method describe in detail.
Embodiment one:
Fig. 1 is a kind of flow chart of the detection method of the whole network wooden horse control terminal provided in an embodiment of the present invention.
In embodiments of the present invention, this method is applied to the detection system of the whole network wooden horse control terminal of simulation controlled terminal System, includes the following steps:
Step S101 receives the object to be measured network segment input by user;
The above-mentioned object to be measured network segment can be the whole network, can also be the arbitrary network segment that user specifies.
Step S102 carries out port scan, with true according to scanning result to all targets to be detected of target network section to be measured Fixed doubtful detection target;
Wherein, above-mentioned target to be detected is the network equipment in the above-mentioned object to be measured network segment, and the network equipment includes IP address With multiple ports;Specifically, target to be detected is primarily referred to as the IP address of the network equipment.
Above-mentioned doubtful detection target be include target to be detected there are the port of remote control Trojan fingerprint;It sweeps above-mentioned port It retouches and is detected using active iterative scans.It is more efficient compared to traditional port scan mode.
When specific implementation, include the following steps with reference to Fig. 2, step S102:
Step S1021 carries out port scan to target to be detected;
Step S1022 extracts the response data that target to be detected carries out the port of the opening got after port scan;
Step S1023, the open port of data judgement is with the presence or absence of remote control Trojan control terminal fingerprint according to response;
If so, S1024 is thened follow the steps, if it is not, thening follow the steps S1025;
Step S1024 is doubtful inspection there will be the target label to be detected belonging to the port of remote control Trojan control terminal fingerprint Survey target.
Step S1025 is abandoned.
Step S103 detects doubtful detection target using the remote control Trojan exploration policy of pre-configuration, is doubted with determining Whether it is remote control Trojan control terminal like detection target.
The remote control Trojan exploration policy of above-mentioned pre-configuration is the known remote control Trojan sample of simulation in control terminal and is controlled The interactive strategy reached the standard grade between end processed, upper line process include handshake procedure, verification process, communication data packet, wherein according to controlled End processed is sent to the exploration policy of the remote control Trojan exploration policy of the communication message generation pre-configuration of control terminal during reaching the standard grade; The remote control Trojan exploration policy being pre-configured is generated to the response of the communication message of controlled terminal during reaching the standard grade according to control terminal Feedback information.It should be noted that the remote control Trojan exploration policy of above-mentioned pre-configuration can by manually configuring completion, It can also be trained and be realized by machine.
In the present embodiment, the remote control Trojan exploration policy of above-mentioned pre-configuration is multiple;
At this point, step S103 is realized by following steps:
A detects above-mentioned doubtful detection target using the remote control Trojan exploration policy of each above-mentioned pre-configuration, with true Whether fixed above-mentioned doubtful detection target is remote control Trojan control terminal.
Specifically, step A can be executed by following steps:
Exploration policy included in remote control Trojan exploration policies of the A1 according to each above-mentioned pre-configuration is to above-mentioned doubtful inspection It surveys target and sends probe messages, and obtain the feedback information that above-mentioned doubtful detection target is sent based on above-mentioned probe messages;
A2 judges to preset feedback letter included in remote control Trojan exploration policy of the above-mentioned feedback information with above-mentioned pre-configuration Whether breath is consistent;
If consistent, A3 is thened follow the steps;If it is inconsistent, executing step A4.
A3 confirms that above-mentioned doubtful detection target is remote control Trojan control terminal.
A4 is abandoned.
The detection method of the whole network wooden horse control terminal provided in an embodiment of the present invention, including:Receive mesh to be measured input by user Mark the network segment;Port scan is carried out to all targets to be detected of target network section to be measured, to determine doubtful detection according to scanning result Target;Wherein, target to be detected is the network equipment in the object to be measured network segment;Utilize the remote control Trojan exploration policy pair of pre-configuration Whether doubtful detection target is detected, be remote control Trojan control terminal with the doubtful detection target of determination.Therefore, the embodiment of the present invention The technical solution of offer, first by receiving the object to be measured network segment input by user, such as the whole network or other specified network segments; Then port scan is carried out to target to be detected in the object to be measured network segment, to determine doubtful detection mesh according to scanning result Mark;Finally doubtful detection target is detected using the remote control Trojan exploration policy of pre-configuration, with the doubtful detection target of determination Whether it is remote control Trojan control terminal, it can be found that remote control Trojan control terminal and understanding its distribution situation under network environment, is conducive to Improve user experience, alleviating in the prior art can not need the discovery of remote control Trojan control terminal distribution situation under network environment It asks, the technical problem for causing user experience not high.
It should be noted that in one embodiment, which can obtain a doubtful detection target acquisition One doubtful detection target;Specifically, port scan is carried out to all targets to be detected of the above-mentioned object to be measured network segment successively, when It scans to a doubtful detection target, then the doubtful detection target is visited using the remote control Trojan exploration policy of pre-configuration It surveys;Then port scan is carried out to next target to be detected.
In another embodiment, which can also be and obtains all doubtful detection targets to be detected successively;That is, Port scan is carried out to all targets to be detected of the above-mentioned object to be measured network segment successively, scanning is got in the object to be measured network segment All doubtful detection targets;Then the remote control Trojan exploration policy of pre-configuration is recycled to be carried out successively to each doubtful detection target Detection.
Embodiment two:
As shown in figure 3, on the basis of embodiment one, an embodiment of the present invention provides another the whole network wooden horse control terminals Detection method, difference lies in this method further includes with embodiment one:
Step S301 is pre-configured remote control Trojan exploration policy.
Specifically, step S301 includes mainly:
1, client, the server-side of existing remote control Trojan sample are put into virtual machine, and the IP address of virtual machine is set For address of reaching the standard grade.
Specifically, receiving client (i.e. control terminal) in known remote control Trojan sample and above-mentioned known using virtual machine Remote control Trojan sample in server-side (i.e. controlled terminal), and set the IP address of above-mentioned virtual machine to the upper of remote control Trojan Line address;Server-side can actively reach the standard grade with client and connect at this time.
2, above-mentioned client and server-side communication message in communication process are obtained;
Specifically, carrying out packet capturing to client and server-side respectively, the communication message of client and server-side interaction is recorded, Acquire the communication message that above-mentioned client and server-side generate in the interactive communication process that reach the standard grade;The communication report Text includes the communication message (referred to herein as exploration policy) of server-side and the communication message (referred to herein as feedback information) of client;
3, communication packet analog detection process is extracted and utilized, judges that test is reached the standard grade according to analog result and whether succeeds;
Specifically, detection system simulates controlled terminal, pass through the server-side for extracting above-mentioned known remote control Trojan sample Communication message and utilize the communication message of above-mentioned known remote control Trojan sample server-side and above-mentioned known remote control Trojan The client of sample carries out interaction of reaching the standard grade, to simulate the detection process of controlled terminal, according to the sound of control terminal in the detection process Should result judge that the test of detection system simulation controlled terminal reaches the standard grade and whether succeeds, wherein above-mentioned detection process includes shaking hands Process, verification process, communication data packet;It should be noted that the interaction that interaction of reaching the standard grade is primarily referred to as in service layer, i.e. business Interaction.
If success, thens follow the steps 4;It is abandoned if unsuccessful.
4, the detection process simulated to success records;
5, above-mentioned detection process is stored as remote control Trojan exploration policy with preset data form.
In view of known remote control Trojan sample is multiple, therefore, remote control Trojan exploration policy here is multiple and right In different remote control Trojan samples, the interactive particular content of reaching the standard grade of different remote control Trojan exploration policies (including communication message, Such as business password etc.) be also different.
Step S301 passes through the interactive process that known remote control Trojan is reached the standard grade between controlled terminal and control terminal, configuration Remote control Trojan exploration policy is generated, specifically, by carrying out data to the handshake procedure of reaching the standard grade of remote control Trojan under experimental situation Packet interaction analysis converts the exchange method extracted and protocol procedures to the interactive strategy that remote control Trojan is reached the standard grade, consequently facilitating In actual detection, simulates controlled terminal and carries out interaction of reaching the standard grade using the remote control Trojan exploration policy of generation and detection target, Determined whether for remote control Trojan control terminal according to the response of detection target.
Step S302 extracts remote control Trojan exploration policy pair when it is remote control Trojan control terminal to determine doubtful detection target Doubtful detection target carries out the detection information in detection process;
Above-mentioned detection information includes the doubtful IP address for detecting target, port numbers, remote control Trojan type, detection time.
Further, this method further includes:Detection information is stored with preset format to database.
Using be pre-configured remote control Trojan exploration policy to all doubtful detection targets in above-mentioned target to be detected into Row detection, to determine whether above-mentioned all doubtful detection targets are this method after remote control Trojan control terminal according to interaction results Further include:
Step S303 is generated based on the doubtful detection target for being confirmed as remote control Trojan control terminal in the object to be measured network segment and is divided Cloth result.
Wherein, above-mentioned distribution results are for analyzing the security risk trend of the above-mentioned object to be measured network segment.
The present invention is implemented the detection method provided and is detected using active iterative scans, such as is for the object to be measured network segment Active iteration the whole network scanning probe is used when the whole network, and remote control Trojan control is detected and found according to remote control Trojan fingerprint characteristic End, may further analyze security risk trend of the remote control Trojan to the whole network.It is different from traditional port detection scanning (syn+ The modes such as ack), this method using simulation remote control Trojan communication message as probe messages come active probe, and with more efficient The whole network speed of detection detects internet to ensure detection data validity.
In order to make it easy to understand, with reference to Fig. 4 to the detection method of the whole network wooden horse control terminal provided in an embodiment of the present invention Practical application scene be illustrated:
Step S401 receives the network segment input by user that carry out remote control Trojan distribution detection;
Step S402 carries out network port scanning to target to be detected;
Step S403 extracts the response data of open port, judges whether remote control Trojan control terminal fingerprint.
And if so, entering in next step, i.e. step S404, if there is no S409 is thened follow the steps, abandon.
Step S404 is loaded into the interactive strategy that the remote control Trojan of pre-configuration is reached the standard grade, to there are remote control Trojan control terminal fingerprints Port reach the standard grade simulation interactive operation;
Here the interactive strategy that remote control Trojan is reached the standard grade refers to remote control Trojan exploration policy.
Whether the response of step S405, the simulation interactive operation that judges to reach the standard grade configure in the interactive strategy reached the standard grade with remote control Trojan Response it is consistent;
Specifically, judgement is reached the standard grade, there are the masters of the port of remote control Trojan control terminal fingerprint detected in simulation interactive operation Whether the response results of the known remote control Trojan control terminal configured in the interactive strategy that the response results of machine are reached the standard grade with remote control Trojan Unanimously.
If consistent, S406 is thened follow the steps, if inconsistent then follow the steps S410, is abandoned.
Step S406 confirms that detected host is the control terminal that remote control Trojan is reached the standard grade;
The detection information of the remote control Trojan control terminal detected is stored in database by step S407 with preset format;
Here detection information includes but not limited to IP address, port numbers, remote control Trojan type, detection time information.
Specifically, when by the IP address of the remote control Trojan control terminal detected, port numbers, remote control Trojan type, detection Between etc. information with json (JavaScript Object Notation, JS objects numbered musical notation) format be stored in MongoDB databases, Middle json formats are a kind of data interchange formats of lightweight;MongoDB databases are a kind of based on distributed document storage Database.
Step S408, judges whether detection mission is completed.
Specifically, judging whether detection mission is completed by the way that whether the object queue to be detected judged in the network segment is completed.
If completed, S410 is thened follow the steps, if do not completed, continues detection operation back to step S402.
Step S409 terminates detection.
The present embodiments relate to a kind of detection sides of the whole network wooden horse control terminal of wooden horse control terminal in detection network environment Method and system, by carrying out data-bag interacting analysis to the handshake procedure of reaching the standard grade of remote control Trojan under experimental situation, by what is extracted Exchange method and protocol procedures are converted into the interactive strategy that remote control Trojan is reached the standard grade, in the network segment specified to the whole network target or user Detection target when being detected, friendship of reaching the standard grade is carried out with target is detected as probe messages using simulation remote control Trojan communication message Mutually, while according to the feedback information (including far controlling program fingerprint) of detection target response to determine whether being controlled for remote control Trojan End.
Embodiment three:
As shown in figure 5, an embodiment of the present invention provides a kind of detection systems of the whole network wooden horse control terminal, including:Receive mould Block 501, scan module 502 and detecting module 503.
Wherein, receiving module 501 is for receiving the object to be measured network segment input by user;
Scan module 502 is used to carry out port scan to all targets to be detected of the above-mentioned object to be measured network segment, with basis Scanning result determines doubtful detection target, wherein above-mentioned target to be detected is the network equipment in the above-mentioned object to be measured network segment;
Detecting module 503 is for visiting above-mentioned doubtful detection target using the remote control Trojan exploration policy of pre-configuration It surveys, whether is remote control Trojan control terminal with the above-mentioned doubtful detection target of determination.
Further, above-mentioned scan module is specifically used for:Port scan is carried out to above-mentioned target to be detected;Extract above-mentioned wait for Detection target carries out the response data of the port of the opening got after port scan;Judged according to above-mentioned response data above-mentioned Open port whether there is remote control Trojan control terminal fingerprint;If so, there will be the port institutes of remote control Trojan control terminal fingerprint The target label to be detected belonged to is above-mentioned doubtful detection target.
Further, the remote control Trojan exploration policy of above-mentioned pre-configuration is multiple;
Above-mentioned detecting module is specifically used for:Using the remote control Trojan exploration policy of each above-mentioned pre-configuration to above-mentioned doubtful inspection It surveys target to be detected, whether is remote control Trojan control terminal with the above-mentioned doubtful detection target of determination.
The detection system of the whole network wooden horse control terminal provided in an embodiment of the present invention, is stored with and carries out simulation friendship with control terminal Mutual exploration policy can simulate controlled terminal in remote control Trojan control terminal detection process in a network environment, pass through simulation Various remote control Trojan communication messages determine whether the detection target in network environment is remote control Trojan control as probe messages End, can active probe know the distribution situation of remote control Trojan control terminal in network environment, solve existing in the prior art How active probe remote control Trojan control terminal distribution situation the problem of.
The detection system of the whole network wooden horse control terminal provided in an embodiment of the present invention, the whole network wooden horse provided with above-described embodiment The detection method technical characteristic having the same of control terminal reaches identical technology so can also solve identical technical problem Effect.
The detection method of the whole network wooden horse control terminal provided in an embodiment of the present invention passes through with system to the whole network or specified network Environment carries out active probe, is capable of detecting when to be currently running the malicious host of the control terminal program of remote control Trojan in target network, Can solve the problems, such as how active probe remote control Trojan control terminal distribution situation, provide height for the work of the network information security The threat information and data of value.
The technique effect and preceding method embodiment phase of the system that the embodiment of the present invention is provided, realization principle and generation Together, to briefly describe, system embodiment part does not refer to place, can refer to corresponding contents in preceding method embodiment.
It is apparent to those skilled in the art that for convenience and simplicity of description, the system of foregoing description It with the specific work process of device, can refer to corresponding processes in the foregoing method embodiment, details are not described herein.
Flow chart and block diagram in attached drawing show the system, method and computer journey of multiple embodiments according to the present invention The architecture, function and operation in the cards of sequence product.In this regard, each box in flowchart or block diagram can generation A part for a part for one module, section or code of table, above-mentioned module, section or code includes one or more uses The executable instruction of the logic function as defined in realization.It should also be noted that in some implementations as replacements, being marked in box The function of note can also occur in a different order than that indicated in the drawings.For example, two continuous boxes can essentially base Originally it is performed in parallel, they can also be executed in the opposite order sometimes, this is depended on the functions involved.It is also noted that It is the combination of each box in block diagram and or flow chart and the box in block diagram and or flow chart, can uses and execute rule The dedicated hardware based system of fixed function or action is realized, or can use the group of specialized hardware and computer instruction It closes to realize.
Referring to Fig. 6, the embodiment of the present invention also provides a kind of electronic equipment 100, including:Processor 40, memory 41, bus 42 and communication interface 43, above-mentioned processor 40, communication interface 43 and memory 41 connected by bus 42;Processor 40 is for holding The executable module stored in line storage 41, such as computer program.
Wherein, memory 41 may include high-speed random access memory (RAM, Random Access Memory), May further include nonvolatile memory (non-volatile memory), for example, at least a magnetic disk storage.By at least One communication interface 43 (can be wired or wireless) realizes the communication between the system network element and at least one other network element Connection can use internet, wide area network, local network, Metropolitan Area Network (MAN) etc..
Bus 42 can be isa bus, pci bus or eisa bus etc..Above-mentioned bus can be divided into address bus, data Bus, controlling bus etc..Only indicated with a four-headed arrow for ease of indicating, in Fig. 6, it is not intended that an only bus or A type of bus.
Wherein, memory 41 is for storing program, and above-mentioned processor 40 executes above-mentioned journey after receiving and executing instruction Sequence, the method performed by system that the stream process that aforementioned any embodiment of the embodiment of the present invention discloses defines can be applied to handle In device 40, or realized by processor 40.
Processor 40 may be a kind of IC chip, the processing capacity with signal.During realization, above-mentioned side Each step of method can be completed by the integrated logic circuit of the hardware in processor 40 or the instruction of software form.Above-mentioned Processor 40 can be general processor, including central processing unit (Central Processing Unit, abbreviation CPU), network Processor (Network Processor, abbreviation NP) etc.;It can also be digital signal processor (Digital Signal Processing, abbreviation DSP), application-specific integrated circuit (Application Specific Integrated Circuit, referred to as ASIC), ready-made programmable gate array (Field-Programmable Gate Array, abbreviation FPGA) or other are programmable Logical device, discrete gate or transistor logic, discrete hardware components.It may be implemented or execute in the embodiment of the present invention Disclosed each method, step and logic diagram.General processor can be microprocessor or the processor can also be to appoint What conventional processor etc..The step of method in conjunction with disclosed in the embodiment of the present invention, can be embodied directly in hardware decoding processing Device executes completion, or in decoding processor hardware and software module combination execute completion.Software module can be located at Machine memory, flash memory, read-only memory, programmable read only memory or electrically erasable programmable memory, register etc. are originally In the storage medium of field maturation.The storage medium is located at memory 41, and processor 40 reads the information in memory 41, in conjunction with Its hardware completes the step of above method.
In another embodiment, an embodiment of the present invention provides a kind of non-volatile programs that can perform with processor The computer-readable medium of code, above procedure code make the processor execute method described in above method embodiment.
In addition, in the description of the embodiment of the present invention unless specifically defined or limited otherwise, term " installation ", " phase Even ", " connection " shall be understood in a broad sense, for example, it may be being fixedly connected, may be a detachable connection, or be integrally connected;It can Can also be electrical connection to be mechanical connection;It can be directly connected, can also indirectly connected through an intermediary, Ke Yishi Connection inside two elements.For the ordinary skill in the art, above-mentioned term can be understood at this with concrete condition Concrete meaning in invention.
In the description of the present invention, it should be noted that term "center", "upper", "lower", "left", "right", "vertical", The orientation or positional relationship of the instructions such as "horizontal", "inner", "outside" be based on the orientation or positional relationship shown in the drawings, merely to Convenient for the description present invention and simplify description, do not indicate or imply the indicated system or element must have a particular orientation, With specific azimuth configuration and operation, therefore it is not considered as limiting the invention.In addition, term " first ", " second ", " third " is used for description purposes only, and is not understood to indicate or imply relative importance.
It is apparent to those skilled in the art that for convenience and simplicity of description, the system of foregoing description, The specific work process of system and unit, can refer to corresponding processes in the foregoing method embodiment, and details are not described herein.
In several embodiments provided herein, it should be understood that disclosed system, system and method, it can be with It realizes by another way.System embodiment described above is only schematical, for example, the division of the unit, Only a kind of division of logic function, formula that in actual implementation, there may be another division manner, in another example, multiple units or component can To combine or be desirably integrated into another system, or some features can be ignored or not executed.Another point, it is shown or beg for The mutual coupling, direct-coupling or communication connection of opinion can be by some communication interfaces, system or unit it is indirect Coupling or communication connection can be electrical, machinery or other forms.
The unit illustrated as separating component may or may not be physically separated, aobvious as unit The component shown may or may not be physical unit, you can be located at a place, or may be distributed over multiple In network element.Some or all of unit therein can be selected according to the actual needs to realize the mesh of this embodiment scheme 's.
In addition, each functional unit in each embodiment of the present invention can be integrated in a processing unit, it can also It is that each unit physically exists alone, it can also be during two or more units be integrated in one unit.
It, can be with if the function is realized in the form of SFU software functional unit and when sold or used as an independent product It is stored in the executable non-volatile computer read/write memory medium of a processor.Based on this understanding, of the invention Technical solution substantially the part of the part that contributes to existing technology or the technical solution can be with software in other words The form of product embodies, which is stored in a storage medium, including some instructions use so that One computer equipment (can be personal computer, server or the network equipment etc.) executes each embodiment institute of the present invention State all or part of step of method.And storage medium above-mentioned includes:USB flash disk, mobile hard disk, read-only memory (ROM, Read- Only Memory), random access memory (RAM, Random Access Memory), magnetic disc or CD etc. are various can be with Store the medium of program code.
Finally it should be noted that:Embodiment described above, only specific implementation mode of the invention, to illustrate the present invention Technical solution, rather than its limitations, scope of protection of the present invention is not limited thereto, although with reference to the foregoing embodiments to this hair It is bright to be described in detail, it will be understood by those of ordinary skill in the art that:Any one skilled in the art In the technical scope disclosed by the present invention, it can still modify to the technical solution recorded in previous embodiment or can be light It is readily conceivable that variation or equivalent replacement of some of the technical features;And these modifications, variation or replacement, do not make The essence of corresponding technical solution is detached from the spirit and scope of technical solution of the embodiment of the present invention, should all cover the protection in the present invention Within the scope of.Therefore, the protection scope of the present invention shall be subject to the protection scope of the claims.

Claims (10)

1. a kind of detection method of the whole network wooden horse control terminal, which is characterized in that including:
Receive the object to be measured network segment input by user;
Port scan is carried out to all targets to be detected of the object to be measured network segment, to determine doubtful detection according to scanning result Target;
The doubtful detection target is detected using the remote control Trojan exploration policy of pre-configuration, with the determination doubtful detection Whether target is remote control Trojan control terminal.
2. according to the method described in claim 1, it is characterized in that, all mesh to be detected to the object to be measured network segment Mark carries out port scan, obtains doubtful detection target, including:
Port scan is carried out to the target to be detected;
Extract the response data that the target to be detected carries out the port of the opening got after port scan;
Judge that the port of the opening whether there is remote control Trojan control terminal fingerprint according to the response data;
If so, being the doubtful detection mesh there will be the target label to be detected belonging to the port of remote control Trojan control terminal fingerprint Mark.
3. according to the method described in claim 2, it is characterized in that, the remote control Trojan exploration policy of the pre-configuration is multiple;
It is described that the doubtful detection target is detected using the remote control Trojan exploration policy being pre-configured, it is described doubtful with determination Detect whether target is remote control Trojan control terminal, including:
The doubtful detection target is detected using the remote control Trojan exploration policy of each pre-configuration, described in determination Whether doubtful detection target is remote control Trojan control terminal.
4. according to the method described in claim 3, it is characterized in that, the remote control Trojan using each pre-configuration detects Whether strategy detects the doubtful detection target, be remote control Trojan control terminal with the determination doubtful detection target, packet It includes:
Exploration policy included in remote control Trojan exploration policy according to each pre-configuration is to the doubtful detection target Probe messages are sent, and obtain the feedback information that the doubtful detection target is sent based on the probe messages;
Judge whether preset feedback information included in remote control Trojan exploration policy of the feedback information with the pre-configuration Unanimously;
If consistent, confirm that the doubtful detection target is remote control Trojan control terminal.
5. according to the method described in claim 1, it is characterized in that, the method further includes:
When it is remote control Trojan control terminal to determine the doubtful detection target, extracts the remote control Trojan exploration policy and doubted to described The detection information in detection process is carried out like detection target;Wherein, the detection information include it is doubtful detection target IP address, Port numbers, remote control Trojan type, detection time.
6. according to the method described in claim 1, it is characterized in that, the method further includes:
All doubtful detection targets in the target to be detected are being visited using the remote control Trojan exploration policy of pre-configuration It surveys, after determining whether all doubtful detection targets are remote control Trojan control terminal according to interaction results, is waited for based on described Survey the doubtful detection target generation distribution results for being confirmed as remote control Trojan control terminal in the target network segment, wherein described point Cloth result is for analyzing the security risk trend of the object to be measured network segment.
7. according to the method described in claim 1, it is characterized in that, the method further includes:
The remote control Trojan exploration policy is pre-configured.
8. a kind of detection system of the whole network wooden horse control terminal, which is characterized in that including:
Receiving module, for receiving the object to be measured network segment input by user;
Scan module carries out port scan, to be tied according to scanning for all targets to be detected to the object to be measured network segment Fruit determines doubtful detection target;
Detecting module detects the doubtful detection target for the remote control Trojan exploration policy using pre-configuration, with true Whether the fixed doubtful detection target is remote control Trojan control terminal.
9. system according to claim 8, which is characterized in that the scan module is specifically used for:
Port scan is carried out to the target to be detected;
Extract the response data that the target to be detected carries out the port of the opening got after port scan;
Judge that the port of the opening whether there is remote control Trojan control terminal fingerprint according to the response data;
If so, being the doubtful detection mesh there will be the target label to be detected belonging to the port of remote control Trojan control terminal fingerprint Mark.
10. system according to claim 9, which is characterized in that the remote control Trojan exploration policy of the pre-configuration is multiple;
The detecting module is specifically used for:
The doubtful detection target is detected using the remote control Trojan exploration policy of each pre-configuration, described in determination Whether doubtful detection target is remote control Trojan control terminal.
CN201810809216.0A 2018-07-20 2018-07-20 A kind of detection method and system of the whole network wooden horse control terminal Pending CN108810028A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810809216.0A CN108810028A (en) 2018-07-20 2018-07-20 A kind of detection method and system of the whole network wooden horse control terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810809216.0A CN108810028A (en) 2018-07-20 2018-07-20 A kind of detection method and system of the whole network wooden horse control terminal

Publications (1)

Publication Number Publication Date
CN108810028A true CN108810028A (en) 2018-11-13

Family

ID=64077558

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810809216.0A Pending CN108810028A (en) 2018-07-20 2018-07-20 A kind of detection method and system of the whole network wooden horse control terminal

Country Status (1)

Country Link
CN (1) CN108810028A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112491817A (en) * 2020-11-12 2021-03-12 中国联合网络通信集团有限公司 Honeypot technology-based tracing method and device and honeypot equipment
CN113949748A (en) * 2021-10-15 2022-01-18 北京知道创宇信息技术股份有限公司 Network asset identification method and device, storage medium and electronic equipment

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101567884A (en) * 2009-05-26 2009-10-28 西北工业大学 Method for detecting network theft Trojan
CN103532957A (en) * 2013-10-18 2014-01-22 电子科技大学 Device and method for detecting trojan remote shell behavior
CN103701777A (en) * 2013-12-11 2014-04-02 长春理工大学 Remote network attack and defense virtual simulation system based on virtualization and cloud technology
US20140366088A1 (en) * 2004-04-07 2014-12-11 Fortinet, Inc. Systems and methods for passing network traffic content

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140366088A1 (en) * 2004-04-07 2014-12-11 Fortinet, Inc. Systems and methods for passing network traffic content
CN101567884A (en) * 2009-05-26 2009-10-28 西北工业大学 Method for detecting network theft Trojan
CN103532957A (en) * 2013-10-18 2014-01-22 电子科技大学 Device and method for detecting trojan remote shell behavior
CN103701777A (en) * 2013-12-11 2014-04-02 长春理工大学 Remote network attack and defense virtual simulation system based on virtualization and cloud technology

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
天绍文化,田元: "《看图学 电脑优化、软硬件升级、系统检测、故障排除》", 31 August 2008 *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112491817A (en) * 2020-11-12 2021-03-12 中国联合网络通信集团有限公司 Honeypot technology-based tracing method and device and honeypot equipment
CN113949748A (en) * 2021-10-15 2022-01-18 北京知道创宇信息技术股份有限公司 Network asset identification method and device, storage medium and electronic equipment
CN113949748B (en) * 2021-10-15 2023-11-28 北京知道创宇信息技术股份有限公司 Network asset identification method and device, storage medium and electronic equipment

Similar Documents

Publication Publication Date Title
US11265334B1 (en) Methods and systems for detecting malicious servers
Rao et al. Using the middle to meddle with mobile
US10193929B2 (en) Methods and systems for improving analytics in distributed networks
CN113705619A (en) Malicious traffic detection method, system, computer and medium
CN109951436B (en) Trusted terminal verification method and device
AU2015403433A1 (en) System and method for high speed threat intelligence management using unsupervised machine learning and prioritization algorithms
Tambe et al. Detection of threats to IoT devices using scalable VPN-forwarded honeypots
US20230179619A1 (en) System and Method for Device Context and Device Security
CN107547490B (en) Scanner identification method, device and system
JP6674036B2 (en) Classification device, classification method and classification program
CN107332804B (en) Method and device for detecting webpage bugs
CN108076041A (en) A kind of DNS flow rate testing methods and DNS flow quantity detecting systems
CN108429653A (en) A kind of test method, equipment and system
CN107330326A (en) A kind of malice trojan horse detection processing method and processing device
US20230344846A1 (en) Method for network traffic analysis
CN108810028A (en) A kind of detection method and system of the whole network wooden horse control terminal
CN106911665B (en) Method and system for identifying malicious code weak password intrusion behavior
CN113497807A (en) Method and device for detecting user login risk and computer readable storage medium
CN108768934A (en) Rogue program issues detection method, device and medium
CN109359467B (en) Precise identification and full-network linkage defense method and system for unknown Lesox virus
US20200089877A1 (en) Malicious event detection device, malicious event detection method, and malicious event detection program
KR101854981B1 (en) Method for generating data set for cyber warface exercise and technology verification and apparatus thereof
WO2024007615A1 (en) Model training method and apparatus, and related device
US11509657B2 (en) Determination device, determination method, and determination program
KR20190073481A (en) Fingerprint determination for network mapping

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20181113