Font Size: a A A

A Study On The Techniques Of Trojan Horse Attack And Protection

Posted on:2007-04-19Degree:MasterType:Thesis
Country:ChinaCandidate:G S XuFull Text:PDF
GTID:2178360185493784Subject:Electronics and Communications Engineering
Abstract/Summary:PDF Full Text Request
In the network information systems, the Trojan technique has been used as the important tool by hackers or lawless persons to invade or control other network or computer because of its speciality of concealment, remote loading and control. We must understand the trojan horse from source so that we can reduce the damage brought by the Trojan horse. This thesis systematically studies and analyzes the principle and function of various trojan horses , the techniques and ideas of trojan loading, the startup methods and hidden methods of the trojan horses ,and the history and the development direction of the trojan horses. By providing a corresponsive resolvent for those typical trojan horse attack, this theis will be used as the reference for organizations and personnels in their engaging in the network managemant activity. And it would be helpful in impellinghealthy development of network information system .
Keywords/Search Tags:Trojan horse, Internet, Attack, Protection, leaks, back door
PDF Full Text Request
Related items