首页> 外文会议>International Symposium on Computational Intelligence and Design >Analysis of Trojan Horse Events by Query of Vulnerability Information in Searching Engines
【24h】

Analysis of Trojan Horse Events by Query of Vulnerability Information in Searching Engines

机译:搜索引擎中漏洞信息查询分析特洛伊木马赛事

获取原文

摘要

Trojan Horse is one of the most common and most serious attacking approaches by hackers in information security. It is important to analyze and predict this type of attack events and then take appropriate counter-measures accordingly. However, it is difficult to have a deep analysis of the attacks only based on Trojan Horse event information itself. In this paper, we propose a new analysis method by comparing the life cycle of Trojan Horse events in China with the life cycle of queries about their exploited vulnerability in search engines. We find that the peak of query cycle is ahead of the peak of attack events. The result suggests that in China, the Trojan Horse attacks are conducted mainly by amateur hackers, rather than professional hackers. The result is also helpful for prediction of Trojan Horse attacks and then applying counter-measures.
机译:特洛伊马是黑客信息安全中最常见和最严重的攻击方法之一。分析和预测这种类型的攻击事件非常重要,然后相应采取适当的反措施。然而,难以基于特洛伊木马事件信息本身对攻击进行深度分析。在本文中,我们提出了一种新的分析方法,通过比较中国在中国在搜索引擎中的漏洞漏洞的生命周期与询问中的木马赛事的生命周期。我们发现查询周期的峰值领先于攻击事件的峰值。结果表明,在中国,特洛伊木马攻击主要由业余黑客而非专业黑客进行。结果也有助于预测特洛伊木马攻击,然后申请反措施。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号