Font Size: a A A

Research On Defense And Detection Of Web Trojan

Posted on:2012-06-21Degree:MasterType:Thesis
Country:ChinaCandidate:W G HuangFull Text:PDF
GTID:2178330335950632Subject:Information security
Abstract/Summary:PDF Full Text Request
ABSTRACT:Internet has greatly changed the human way of life and working habits, people benefit a lot in all aspects, meanwhile, internet is encountering increasingly serious security problem just because of its internal opening and vulnerability. The most typical attacks are viruses and Trojans, and web Trojan, one kind of Trojan, now is the most prevalent Trojan, as it can be easily made, efficiently spread, variant forms, diversity ways of linked to Trojan. It causes quite a lot serious security problem for general internet users, so doing research on defense and detection of web Trojan is in urgent demands.According to the situation of web Trojan in 2010, the paper systematically illustrates the basic concepts, attack principles of web Trojan, ways of linked to Trojan, the relationship between web Trojan and vulnerabilities, and analyzes a specific case of how web Trojan attacks. After this wide direction of study, this paper proposes a set of corresponding defensive measures, such as browser security settings, the use of third-party browser, disable the remote registry and so on.In order to better prevent Internet users from being attacked by Trojan, the paper also proposes a COM Interface based on IE web Trojan detection system which is designed for making a safer internet environment for internet users. The principle is that Internet Explorer does not render the web pages after they are downloaded; therefore, this system scans the whole web pages (containing HTML, CSS, JS file) first when responding to IE DocumentComplete event, then picks out the absolute links to match the links in the malicious-link Library; if matches, clear the malicious code. Finally, Internet Explorer finishes rendering the web pages. Thus internet users could normally browse in a safe environment.
Keywords/Search Tags:Trojan, Web Trojan, vulnerability, linked to Trojan, defense, detection
PDF Full Text Request
Related items