Device and method for detecting webpage Trojan horse in server, and storage medium
A web Trojan horse and server technology, applied in the field of network information security, can solve the problems of large CPU and memory consumption, long time consumption, dependence, etc., and achieve the effect of reducing resource consumption
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0061] In order to facilitate the understanding of various aspects, features and advantages of the technical solutions of the present invention, the present invention will be specifically described below in conjunction with the accompanying drawings. It should be understood that the various implementations described below are only for illustration, rather than limiting the protection scope of the present invention.
[0062] The first aspect of the embodiments of the present invention provides a device deployed in the cloud for detecting webpage Trojan horses in a server. figure 1 A schematic diagram of an apparatus for detecting a webpage Trojan in a server deployed in the cloud according to an embodiment of the present invention is shown. Such as figure 1 As shown, the device (hereinafter referred to as the cloud detection device) 10 deployed in the detection server of the webpage Trojan horse in the cloud is used to detect the webpage Trojan horse in the server deployed in ...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com