Font Size: a A A

Research And System Realization On The Prevention System Of Trojan Virus

Posted on:2008-11-15Degree:MasterType:Thesis
Country:ChinaCandidate:S HuangFull Text:PDF
GTID:2178360245464311Subject:Computer technology
Abstract/Summary:PDF Full Text Request
Presently, computer viruses are penetrating every area of information communities and have imposed substantial threats and risks on the computer system. To ensure the availability and security of the information and raise the computer users'awareness of Trojan virus prevention, intensive research on preventing the computer viruses, especially Trojan viruses, is imminent.This paper begins with the analysis of the origin and status of the Trojan viruses, then tracks and analyzes hundreds of popular Trojan common attack means to seek their similarity. After constantly experiments and analysis, the author has finally summarized up some of the most common attack means: revised system registry, modify documents open association, remote screen capture, remote shutdown and restart, keyboard and mouse control, the remote file management. In order to further reveal the principle and danger of these commonly used attack means, the author makes use of Windows API function and MFC language development to achieve the simulation of attack process. On basis of this, the author has finished developing Trojan detected modules which is working in process.This paper has also discussed the problem of Trojan wrongly detected and common prevention methods for the Trojan-like virus in the view of some principles and technical analysis. The author's Trojan killing tool for Trojan virus module has already applied in several institutions, with good results. Facing of the new Trojan viruses, the Trojan killing tool is able to work effectively before many antivirus software maker improves his product. This has saved a few million dollars, and has brought good economic and social benefits.The design idea of detecting Trojan which presents in this paper has a guiding significance in the concerned field. This paper introduces a new exploration method for the computer network's security.
Keywords/Search Tags:Trojan virus, Attack technique, API function, Code demonstration
PDF Full Text Request
Related items