Anti-Trojan network security system and method

A network security and Trojan horse technology, which is applied in the field of network security systems for defending against Trojan horses, can solve problems such as Trojan horses losing control of the server, and achieve the effect of preventing important information from being stolen

Inactive Publication Date: 2009-05-13
BEIJINGNETENTSEC
View PDF0 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, even if the server has a Trojan horse, as long as the information can be successfully intercepted before it is sent to the control terminal, the Trojan horse will lose its role in controlling the server.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Anti-Trojan network security system and method
  • Anti-Trojan network security system and method
  • Anti-Trojan network security system and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] In order to make the purpose and technical solution of the present invention clearer, the network security system and method for preventing Trojan horses of the present invention will be described in detail below in conjunction with the accompanying drawings and embodiments.

[0029] figure 2 It is a block diagram of the Trojan horse defense system of the present invention. The system includes a control terminal 240 , a server terminal 210 , the Internet 230 and a network device 220 . The control terminal 240 is the party that remotely controls the server terminal 210, and the service terminal 210 is the party that is remotely controlled by the control terminal 240; the Internet 230 is a network carrier for the control terminal 240 to remotely control the server terminal 210; the network device 220 is connected to the control terminal 240 Between the terminal 240 and the server 210, it is located on the side of the server 210, and its hardware entities are usually rou...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to network safety system and method, more concretely a network safety system and method for preventing Trojan. A control terminal (240) is connected with server (210) through Internet (230) so that control terminal (240) transmits instruction to server (210) and / or server (210) transmits data back to control terminal (240). The network safety system of the invention identifies Trojan virus through virus identification module (221), performs protection operation for server (210) through strategy control module (222). In one embodiment, Trojan virus is identified based on data of application layer, while in another embodiment based on data of application layer and TCP head or IP head information, and based on relation between data packet during connection. The network safety system and method for preventing Trojan of the invention are widely used among LAN and single PC.

Description

technical field [0001] The invention relates to a network security system and method, in particular to a network security system and method for defending against Trojan horses. Background technique [0002] At present, computer network technology affects all aspects of individuals and enterprises. Almost all computers and even personal communication devices such as mobile phones are connected to the Internet, and the Internet has penetrated into every corner of society. The popularity of the Internet has made information security an important social issue. Many program developers with ulterior motives have written a large number of Trojan horse (Trojan horse) programs to spy on other people's privacy and steal other people's confidential information such as online bank account numbers, etc., and then seek economic benefits. . [0003] A Trojan horse (referred to as a Trojan horse) program usually executes an operation that a user does not want while pretending to perform c...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L29/08
Inventor 张永臣张金锋周知远张颖康谢双宾侯爽梁斌
Owner BEIJINGNETENTSEC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products