scispace - formally typeset
Search or ask a question
Topic

Trojan

About: Trojan is a research topic. Over the lifetime, 2028 publications have been published within this topic receiving 33209 citations.


Papers
More filters
Patent
23 Dec 2015
TL;DR: Wang et al. as mentioned in this paper proposed a big data discovery based bot Trojan detection and control method, which specifically comprises the steps of collecting spreading websites so as to acquire a virus sample, analyzing virus characteristics of an infected server, prompting an infected user, and tracking and preventing a control source.
Abstract: The invention aims to provide a big data discovery based bot Trojan virus detection and control method, which specifically comprises the steps of collecting spreading websites so as to acquire a virus sample, analyzing virus characteristics of an infected server, prompting an infected user, and tracking and preventing a control source. According to the invention, trusted domain names are filtered through a white list, analysis is carried out on an attack source of a suspicious domain name, and finally a remote control terminal address of a hacker-controlled computer is recognized through an attack source hacker-controlled computer. Statistical analysis data is recorded to a virus database after analysis, and tracking analysis is carried out on a botnet and viruses. Meanwhile, the suspicious domain name is forwarded, thereby avoiding a host from being infected by Trojan viruses in access of users.

11 citations

Patent
30 Jul 2014
TL;DR: In this paper, the authors proposed a trojan horse detection method based on terminal traffic, which comprises the steps of capturing data traffic information, analyzing time period traffic, analyzing uplink data traffic and downlink data traffic of a terminal, conducting approval matching between the data traffic which is analyzed intelligently and communication white list data, and detecting the correctness of the terminal traffic data packet.
Abstract: The invention provides a trojan horse detection method based on terminal traffic. The method comprises the steps of capturing data traffic information, analyzing time period traffic, analyzing uplink data traffic and downlink data traffic of a terminal, conducting approval matching between the data traffic which is analyzed intelligently and communication white list data, and detecting the correctness of a terminal traffic data packet. According to the trojan horse detection method based on the terminal traffic, the situation that when a conventional trojan horse detection means according to existing feature codes, samples, malicious codes and the like in the prior art is used, trojan horses which are highly hidden, incapable of being killed, capable of conducting irregular communication and being injected through system program files and the like can not be found or killed in time is changed; by means of the trojan horse detection method based on the terminal traffic, the terminal data traffic can be monitored in real time, whether traffic data generated by a program are abnormal is determined through a multi-dimensional detection model, deep detection of variant trojan horses or advanced trojan horses or residual trojan horses is achieved, the safety of a computer is improved, the false alarm rate is lowered, and the accuracy of trojan horse positioning is improved.

11 citations


Network Information
Related Topics (5)
Cloud computing
156.4K papers, 1.9M citations
70% related
Cache
59.1K papers, 976.6K citations
70% related
Planet
27K papers, 980.6K citations
68% related
Compiler
26.3K papers, 578.5K citations
66% related
Key (cryptography)
60.1K papers, 659.3K citations
66% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
2023136
2022282
2021111
2020139
2019144
2018168