Font Size: a A A

The Operating Principle Of Trojan Horse And Technical Study On Defence Against Trojan Horse In Campus Network

Posted on:2009-09-28Degree:MasterType:Thesis
Country:ChinaCandidate:B HuangFull Text:PDF
GTID:2178360272490187Subject:Control Engineering
Abstract/Summary:PDF Full Text Request
With the rapid popularity of the computer network, the human society is entering the information age. The information has brought about huge convenience for our work and life and it already become human's valued resources. But, as a result of the inherent vulnerability of computer system and network information system themselves, and the traits of campus network of the high bandwidth and the high performance and wide utilization of the equipment, the network invading tools, such as Trojan, spring up at this moment, which can built a steady inner foothold on the campus network, in this way, more and more network security problems become perplexing us. And the invaders show a growing invasive trend, which effect the school's normal teaching and learning life from time to time, and effect the regular service of the campus network.It would be a quite effective attack if the attacker built a steady inner foothold by making use of technology of Trojan Horse to permeate into the interior of information system of campus network to offer an unobstructed secure channel for the latter attack. And the technology of Trojan Horse has become an important tool to attack for Hackers or invade/control for outlaws others' networks or computer systems as a result of its traits, such as, the implantability, the invisibility, the unauthoritation, the autostartability and the controllability and so on. In order to prevent campus network from invading by Trojan Horse or hanging Trojan, this paper has researched and analyzed the operating principles and functions of all kinds of Trojan Horses, and implantation, invisibility, autostart and communication. Further, this paper has put forward the corresponding solutions to direct at the attacks of some kind of typical Trojans, especially how to prevent campus network from the attack of ARP Trojan. In the last of the paper, the development of a set of relative more sophisticated network security preventive architecture is brought up, which is an effective method to prevent actively Trojan from invading or attacking as well as an important task to protect the information system security of the campus network.
Keywords/Search Tags:Trojan Horse, Campus network, Network intrusion, S-PTME security preventive architecture
PDF Full Text Request
Related items