Five criteria for Web Trojan protection tools

Source: Internet
Author: User

As network security problems gradually enter people's eyes, network viruses, especially Web Trojans, are now crossing the street, showing how much damage Web Trojans have caused to netizens. The harm of Web Trojans is simply a matter of self-danger for Internet users. During Normal Internet use, they are all taken extra care and are afraid of being attacked by Web Trojans. In fact, Web Trojans are not as terrible as you think. You only need to select a suitable anti-Trojan tool to block Web Trojans.

Standard 1: Zip package scanning capability

In the spread of Web Trojans, ZIP packages are the places where Trojans prefer to hide. When a user downloads a ZIP attachment from a Web mail client and opens it, it is possible that the trojan is already running locally when the user is unaware. And try to infect other users. Therefore, the author believes that when selecting a Web Trojan protection tool, we first need to confirm the scanning capability of this protection tool for Zip compressed packages.

Generally, most Web Trojan protection tools already have this ZIP package scanning tool, but they can only scan single-layer Zip packages. In fact, users may all have experience in this area. Select the ZIP package, right-click it, and find that the decompressed file is still a compressed package. Then decompress the package to obtain a compressed package. After repeating this several times, the final result is the file itself. This involves multi-layer ZIP compression files. When receiving this file, be careful. This is probably a Web Trojan. Nowadays, many Web anti-Trojan tools only have single-layer ZIP compressed package scanning tools. In this case, when two or more layers of data are compressed, the trojan hidden in the data cannot be used. Many Trojans intentionally package a file multiple times to avoid monitoring by using the protection tool.

Therefore, when selecting a trojan protection tool, you need to select the ZIP package that can be scanned, especially the protection tool that supports multi-layer scanning. The effect will be better.

Standard 2: whether the protection tool can scan memory

When a user opens a webpage and the other party has a Web Trojan, the trojan enters the memory of the user host. Then, find the available processes in the memory. If any vulnerabilities (such as defects of a process in the operating system) are discovered ). This is a traditional method and a harmful means of Trojan intrusion.

This requires that an excellent Trojan protection tool also has the ability to scan memory. The memory scan is used to find the latest Trojan Horse inserted into the address space of other processes. In addition, it should be noted that it is dangerous to check the Trojan horse in the memory. If the process is mistakenly killed by other processes available to the system (even if the process is infected by a Trojan), the host or the system in use will crash. This requires us to choose the anti-Trojan tool while taking into account its stability. Especially when the trojan in the memory is involved in automatic scanning and removal, if the key process that may cause the user's system to crash, it is best to send a reminder like a user before clearing it. After the user saves the relevant data, clear it. After all, although Web Trojans are hateful, data is equally important.

Standard 3: unknown viruses need to be analyzed

A high foot, a high devil. In general, Trojans are always a step ahead of protection tools. That is to say, after a trojan arrives (after a period of time), the corresponding protection tool can identify and kill the Trojan. This means that after a trojan is discovered, a considerable number of users are already in use. This will undoubtedly cause great losses to users. After all, the probability of Trojans occurring on you is 100%.

Therefore, when selecting a trojan tool, it is best to check whether this anti-Trojan tool can detect unknown viruses. For example, I recommend an Antiy Trojan protection tool. This is a professional Web Trojan Detection and system security tool. The most important feature of this tool is that it not only detects known Trojans, but also discovers some unknown Trojans. This is mainly because this tool has an Intelligent Analysis System. Determine whether a process is a trojan or infected by a trojan based on the characteristics and running status of the process. Then, the user is reminded. However, due to its uncertainty, the general system does not automatically scan and kill, but only reminds users to pay attention to this process. When users think that this process Trojan is more likely, for security reasons, you can query and kill this process. This can avoid unnecessary damage to users by Trojans to the greatest extent.

For applications with high security levels, such as online banking, pay special attention to this point when choosing a trojan protection tool.

Standard 4: comprehensive monitoring of program communication

From a professional perspective, the running of Web Trojans has certain rules. That is to say, a security expert can view the content of the program communication to determine whether there is a trojan in the webpage or system. However, this requires professional technologies and rich experience. For ordinary users, professional tools are required to comprehensively monitor program communication and tools to make up for their lack of knowledge and experience, to discover processes and ultimately cut off the communication of Trojans.

The most basic principle of Web Trojans is communication between the client and the server. Determining the validity of the server or client identity (for example, whether the server requested by the client or a single connection request connects to multiple servers) is one of the most important criteria for determining whether a program is a trojan. However, it is easy to say that the trojan program will use various means to hide such features, so as to implement the purpose of spoofing protection tools and users.

Therefore, when selecting protection tools, we finally choose these tools with comprehensive monitoring functions for program communication, and cut off Trojan communication if necessary. If the protection tool has this function, security personnel with certain professional skills can use this tool to monitor process communication. This allows you to find processes in the earliest time. In fact, this standard is a bit similar to the third standard. Its main function is to discover and kill processes, namely unknown Web Trojans, in the first time. However, I need to remind you that this requires a high level of professional skills for the operator. Generally, IT personnel of an enterprise are responsible for this purpose. Ordinary users may not be able to do this.

Standard 5: monitoring of specific files and sensitive areas

Different applications in the operating system often have different security requirements. For example, for online banking applications, the security level requirements are relatively high. For these key applications, special consideration is required for Trojan protection. This involves whether the protection function can monitor specific files or sensitive areas.

To put it simply, there are two applications: online banking applications and BBS applications. Both of these are areas of interest for Web Trojans. However, from a security perspective, online banking applications are much more secure than forums. If the two applications are monitored at the same time (sometimes dozens of applications are used by the enterprise), a large amount of information will be recorded. At this time, suspicious behaviors are found from a large amount of information, which is very difficult. However, if only key applications are monitored during monitoring, the scope involved will be very small. IT security personnel can monitor communications more specifically.
 

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.