Trojan program detection method, device, equipment and storage medium

The invention discloses a detection method of a Trojan horse program, which is applied to a server, comprising the following steps: when a computer process is detected, obtaining an uplink flow rate and a downlink flow rate of the computer process; and then judging whether the uplink flow is greater...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: LIN SUHONG, WANG MENG
Format: Patent
Sprache:chi ; eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator LIN SUHONG
WANG MENG
description The invention discloses a detection method of a Trojan horse program, which is applied to a server, comprising the following steps: when a computer process is detected, obtaining an uplink flow rate and a downlink flow rate of the computer process; and then judging whether the uplink flow is greater than the downlink flow; if so, it is determined that there is a Trojan Horse process in the computer process, thereby determining that there is a Trojan Horse program in the server. Because when there is a Trojan on the server, no matter how the Trojan disguises itself, as long as the functions andpurposes of the completion are unchanged, the traffic characteristics transmitted between the server and the client are difficult to change; therefore, compared with the prior art, the method can more accurately detect whether there is a Trojan horse program in the server, so as to be able to check and kill the Trojan horse program, thereby ensuring the security of the server. The invention alsodiscloses a detection devi
format Patent
fullrecord <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_CN109257379A</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>CN109257379A</sourcerecordid><originalsourceid>FETCH-epo_espacenet_CN109257379A3</originalsourceid><addsrcrecordid>eNrjZHANKcrPSsxTKCjKTy9KzFVISS1JTS7JzM9TyE0tychP0QGKlGUmp-oopBaWZhbkpuaVKCTmpSgUl-QXJaanAlWlZJbm8jCwpiXmFKfyQmluBkU31xBnD93Ugvz41OKCxOTUvNSSeGc_QwNLI1NzY3NLR2Ni1AAA7ZwzMQ</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>Trojan program detection method, device, equipment and storage medium</title><source>esp@cenet</source><creator>LIN SUHONG ; WANG MENG</creator><creatorcontrib>LIN SUHONG ; WANG MENG</creatorcontrib><description>The invention discloses a detection method of a Trojan horse program, which is applied to a server, comprising the following steps: when a computer process is detected, obtaining an uplink flow rate and a downlink flow rate of the computer process; and then judging whether the uplink flow is greater than the downlink flow; if so, it is determined that there is a Trojan Horse process in the computer process, thereby determining that there is a Trojan Horse program in the server. Because when there is a Trojan on the server, no matter how the Trojan disguises itself, as long as the functions andpurposes of the completion are unchanged, the traffic characteristics transmitted between the server and the client are difficult to change; therefore, compared with the prior art, the method can more accurately detect whether there is a Trojan horse program in the server, so as to be able to check and kill the Trojan horse program, thereby ensuring the security of the server. The invention alsodiscloses a detection devi</description><language>chi ; eng</language><subject>ELECTRIC COMMUNICATION TECHNIQUE ; ELECTRICITY ; TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><creationdate>2019</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20190122&amp;DB=EPODOC&amp;CC=CN&amp;NR=109257379A$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,776,881,25543,76294</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20190122&amp;DB=EPODOC&amp;CC=CN&amp;NR=109257379A$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>LIN SUHONG</creatorcontrib><creatorcontrib>WANG MENG</creatorcontrib><title>Trojan program detection method, device, equipment and storage medium</title><description>The invention discloses a detection method of a Trojan horse program, which is applied to a server, comprising the following steps: when a computer process is detected, obtaining an uplink flow rate and a downlink flow rate of the computer process; and then judging whether the uplink flow is greater than the downlink flow; if so, it is determined that there is a Trojan Horse process in the computer process, thereby determining that there is a Trojan Horse program in the server. Because when there is a Trojan on the server, no matter how the Trojan disguises itself, as long as the functions andpurposes of the completion are unchanged, the traffic characteristics transmitted between the server and the client are difficult to change; therefore, compared with the prior art, the method can more accurately detect whether there is a Trojan horse program in the server, so as to be able to check and kill the Trojan horse program, thereby ensuring the security of the server. The invention alsodiscloses a detection devi</description><subject>ELECTRIC COMMUNICATION TECHNIQUE</subject><subject>ELECTRICITY</subject><subject>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2019</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNrjZHANKcrPSsxTKCjKTy9KzFVISS1JTS7JzM9TyE0tychP0QGKlGUmp-oopBaWZhbkpuaVKCTmpSgUl-QXJaanAlWlZJbm8jCwpiXmFKfyQmluBkU31xBnD93Ugvz41OKCxOTUvNSSeGc_QwNLI1NzY3NLR2Ni1AAA7ZwzMQ</recordid><startdate>20190122</startdate><enddate>20190122</enddate><creator>LIN SUHONG</creator><creator>WANG MENG</creator><scope>EVB</scope></search><sort><creationdate>20190122</creationdate><title>Trojan program detection method, device, equipment and storage medium</title><author>LIN SUHONG ; WANG MENG</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_CN109257379A3</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>chi ; eng</language><creationdate>2019</creationdate><topic>ELECTRIC COMMUNICATION TECHNIQUE</topic><topic>ELECTRICITY</topic><topic>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</topic><toplevel>online_resources</toplevel><creatorcontrib>LIN SUHONG</creatorcontrib><creatorcontrib>WANG MENG</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>LIN SUHONG</au><au>WANG MENG</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>Trojan program detection method, device, equipment and storage medium</title><date>2019-01-22</date><risdate>2019</risdate><abstract>The invention discloses a detection method of a Trojan horse program, which is applied to a server, comprising the following steps: when a computer process is detected, obtaining an uplink flow rate and a downlink flow rate of the computer process; and then judging whether the uplink flow is greater than the downlink flow; if so, it is determined that there is a Trojan Horse process in the computer process, thereby determining that there is a Trojan Horse program in the server. Because when there is a Trojan on the server, no matter how the Trojan disguises itself, as long as the functions andpurposes of the completion are unchanged, the traffic characteristics transmitted between the server and the client are difficult to change; therefore, compared with the prior art, the method can more accurately detect whether there is a Trojan horse program in the server, so as to be able to check and kill the Trojan horse program, thereby ensuring the security of the server. The invention alsodiscloses a detection devi</abstract><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier
ispartof
issn
language chi ; eng
recordid cdi_epo_espacenet_CN109257379A
source esp@cenet
subjects ELECTRIC COMMUNICATION TECHNIQUE
ELECTRICITY
TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION
title Trojan program detection method, device, equipment and storage medium
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-22T09%3A35%3A44IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=LIN%20SUHONG&rft.date=2019-01-22&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3ECN109257379A%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true