Font Size: a A A

Research On Propagation And Defense Technology Against Malicious Code

Posted on:2008-10-14Degree:MasterType:Thesis
Country:ChinaCandidate:X Y WangFull Text:PDF
GTID:2178360215966241Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Popularity of the Internet, complexity of applications and demand for information sharing those give advantages to the propagation of malicious code. So all kinds of new malicious code emerge incessantly, and their propagation becomes faster. The threat of malicious code to information security becomes increasingly serious. Therefore, the key issues of prevention againstmalicious code-propagation and defense techniques are studied mainly in this thesis, and thena defense system against malicious code for enterprise network is proposed.The following principal achievements have been obtained:First, The definition of malicious code, its basic knowledge and its main characteristics are introduced. Then classification to malicious code is carried on that makes the preparation for the following research.Second, the propagation mechanism of malicious codes, which include computer viruses, worms and Trojan horses, is analyzed minutely. Their propagation ways, propagation methods and main key techniques are also analyzed.Third, the main defense techniques against malicious code, including implements host-based, network-based prevention and benign worm, are studied and comparatively analyzed.Fourth, a defense system against malicious code for enterprise network is proposed, based on analyzing and comparing advantages and disadvantages of the current defense methods against malicious code. The system design goal, the overall structure, the realization method in detail and the key techniques are introduced. This defense system makes good use of the positive qualities of the man, technology and policy. Moreover, this defense system integrates various prevention techniques, such as patching system holes, network detection, firewall technology, isolation technology, detecting behavior characteristic of malicious code, integrity technology, technical guidance and so on.
Keywords/Search Tags:malicious code, computer virus, Internet worm, Trojan horse, enterprise network
PDF Full Text Request
Related items