Font Size: a A A

Study On Application And Practice Of Combo Malware

Posted on:2006-07-29Degree:MasterType:Thesis
Country:ChinaCandidate:X F XiaFull Text:PDF
GTID:2178360182977215Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
The information and network space are influenced greatly by the appearence of Malware(Malicious Code Software). The Malware techniques have been developing fast and appearing to more and more complex , from the first personal computer virus(Brain Virus) in the year of 1983, to the first mobile phone virus Worm.SymbOS.Cabir.f in the year of 2000. In information antagonizing, the malware techniques were used everywhere, that is from INTERNET to wireless communication. And the confidentiality, integrity and availability of information system are threaten by malware. Combo Malware is a multiple malware technique. As the increasingly perfectness of many kinds of defensive mechanisms in the information antagonizing, single malware technique is limited greatly by these defensive mechanisms. While the multiple malware technique, Combo Malware, can combinate several malware techniques, so that the combination of attack can achive more efficiently and influencely. The study on Combo Malware can make for the defensive (?)nisms of Malware, at the same time, this study can also buildup our ability on holding the convertion between attacking and defensive mechanisms in information antagonizing, as well as protecting the rights and interests of our country in information space, so that we can prepare for the information warfare in future.This paper is about to study the application and practice of Combo Malware. Because Combo Malware is a multiple malware technique, so we can use category theory, which is a very efficient tool in analysising structured information, to learn the relation and difference among malware techniques more clearly and definitly. We will process malware as a category, while the character of malware techniques as the morphisms in the malware category,and we also prove malware category's properties as common category. This paper has some difference with appeared Combo Malware(Lion worms and Bugbear.B worms)study, that is we will mainly study on the application of Combo Malware in coordinated attacking.Based on the references on majority of category theory studying and coordinated attacking studying, this paper presents malware based on category theory, and does some experiments about coordinated attacking on category of malware(CACM). The experiments prove that Combo Malware can buildup the hiding and persistence abilities of coordinated attacking. So we believe that Combo Malware must be most of the main technique of network...
Keywords/Search Tags:Malware, Combination, Worms, Categories, Coordinated
PDF Full Text Request
Related items