Font Size: a A A

Research On Trojan Behavior Characteristics And Protection Strategy

Posted on:2013-03-16Degree:MasterType:Thesis
Country:ChinaCandidate:Z Y HuFull Text:PDF
GTID:2248330377459105Subject:Computer system architecture
Abstract/Summary:PDF Full Text Request
With the increasing popularity of network and rapid development of computertechnology, what is coming with is the increasing Severity of threat in Computersecurity. Computer Virus, Trojan horse have become known by the public. Most ofthe users have encountered network attacks such as " Account Steal ","PasswordLose","Lost of Important Data". As we enjoy the convenience and information thatnetwork brought to us, we feel more deeply of the threat coming with it. now a daysNetwork security is an urgent question. In all kinds of network security incident,Trojan horse is the most common, most frequent outbreak.First of all,this thesis do a detailed analysis on Network security situation, list fivemain characteristics about today’s network Security threats. Analysis the factors thatthreaten a network security, point out that Trojan horse is the main reason. then thisthesis do a introduction To Trojan horse from configure Trojan, spread Trojan,camouflage Trojan and run Trojan. Expound the common technologies that used inTrojan horse attack.Chapter3Focus on the analysis Trojan behavior characteristicsand the common behavior of Trojan intrusion. Then come to a conclusion that nomatter what kind of technology the Trojan horse used, Trojan behavior characteristicshave something in common.The thesis summarize the common point of Trojanbehavior characteristics from implanted, installation,run and process Hidden. All thisbuild a theoretical foundation for Trojan behavior detection.By analyzing the Trojan behavioral characteristics, A new type of protection strategy--Trojan attacks trees is improved in this thesis. A new set properties of node isgiven.which make the attack tree more consummate. Base on the existing relationshipof node,a new type Sequence AND(SAND) is put forward.this expand the applicablescope of attack tree.make it more easy to match special trojan. Maximum Trojanattacks trees is put forward. Given a solution on relationship of different attacktrees.And matching algorithms Trojan behavior characteristics the calculation methodof risk indexes.With the help of Winpooch, Prove feasibility of Attack Tree.
Keywords/Search Tags:Trojan horse, Behavior characteristics, Attack Tree
PDF Full Text Request
Related items