Methods for detecting remote access trojan malware and devices thereof

作者: Tenenbaum Itai , Dorfman Hadasa , Shemesh Yaniv

DOI:

关键词: Source codeKey (cryptography)Web pageRemote access trojanComputer scienceSecurity managementWeb browserMalwareWorld Wide Web

摘要: Methods, non-transitory computer readable media, and security management apparatus that retrieves a web page in response to request for the received from client device. Remote access trojan (RAT) malware detection source code is injected into sent device request. The RAT client-side configured to, when executed by browser of device, output an alert possible attack detected based on monitored movement mouse pointer, key events, or executing animations. A determination made has been action initiated according established policy, determining indicates

参考文章(70)
Supranamaya Ranjan, Zhi-Li Zhang, Antonio Nucci, SIP-based VoIP traffic behavior profiling ,(2006)
Matthew L. Cohen, Daniel A. Kuykendall, Prevention of distributed denial of service attacks ,(2010)
Stephan Noller, Richard Hutton, Predictive behavioural targeting ,(2012)
Nikiforova Olga Igorevna, Vladykin Maksim Vladimirovich, Nikiforov Aleksey Igorevich, Prays Nikolay Aleksandrovich, Prays Varvara Borisovna, Nikiforov Igor Alekseevich, Image-based captcha system ,(2012)