Font Size: a A A

The Research And Implementation Of Anti-malicious Software System Based On The User's Perspective

Posted on:2009-03-03Degree:MasterType:Thesis
Country:ChinaCandidate:H G LiuFull Text:PDF
GTID:2178360242985499Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Since the application services on the Internet have become increasingly diverse, the malicious software in the growing trend of rampant online formidable. There are not obvious features in most of malicious software, and it is not designed to attack or damage computer system, but in purpose of getting Commercial interests. These can make users in troubles when using the computer. It needs depth understanding of the intrusion and presence mechanisms of malicious software to drove them off, and make the computer system cleaner and safer.The classification method of malicious software is inadequate at present, and there is no restriction in law. Against these, the paper designs a new classification method by refuse degree of software, which is determined by personal experiences when users using the software.It is hard for the users who are poor in computer. The huge commercial interests make more and more people to design malicious software, the possibility of being installation and the number of anomalies is increasing. The paper summarizes the intrusion ways of malicious software, and designs the methods to prevent malicious software and to make the computer system safer. Most of malicious software will force to amend the related settings of system to provide services to their makers. The paper summarizes the system situations of being modified, and designs the corresponding methods to repair the system.The paper designs and implemented the Anti-malicious software system based on the user's perspective. It can let the junior users follow the wizard, and the senior users can use the custom model. The malicious software which can not be cleared, the paper designs to use DOS model to solute it. Users can chose these three models to solute the problems.The feasibility of the linkage system designed by the paper is proves according to the simulation experiment. At last, aggregate the work this paper have done, and do some outlooks to next work.
Keywords/Search Tags:Network safety, Malicious software, Malicious Plugin, Hooligans software, Anti-malicious software
PDF Full Text Request
Related items