Font Size: a A A

Research On The Protection Of Ferry Trojan With Hiding Techniques

Posted on:2009-09-30Degree:MasterType:Thesis
Country:ChinaCandidate:Q LiFull Text:PDF
GTID:2178360272974523Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
With the large-scale expansion of China's internet, people enjoy the convenience brought by network, while network security has shown the vulnerability at the same time, and less awareness of security, passive protection, which provides a good opportunity for hackers to destroy the network. The speed with the development of internet is so phenomenal that attack technical to be outdone, with attacking aways more changing, detection methods more hidden, killing way more difficult, all of this are troubling. when hackers have a legitimate use of "tactics Wolves", "leapfrog attack" on the theft of secrets and intelligence to infiltrate the network, an alarming discovery of the Ferry horse from the internet with the confidential department which nerver connect cable. According to a recent survey showed that an important way is ferry Trojan attacks, using the mobile medium like USB, mobile hard disk, etc. As a result, the Ferry horse can break the isolation with the line of network defense. So, this article is committed to reseach on the hiding techniques of Ferry horse attack and protection, hoping for providing helping to network security.In order to have a unique understanding of the Ferry horse, reducing the harm brought by it. This article first discussed the technology of network attacks, understanding the mechanism of the work of the Ferry horse from the basic principles of network attacks. In fact, the Ferry horse is also a special computer program, and its main function is to obtain important information. Subsequently, to do a detailed analysis of hiding and start-up technology with the Ferry horse, arrive at a special way of hiding and start-up, design attack procedures for Ferry horse, and analyzes the key source code. Secondly, through understanding the design principle of the Ferry horse, building a virtual environment for simulating the whole attack with it, further understanding of the characteristics of the Ferry horse attacks. Finally, summed up the traditional defense framework, with its defect, take the initiative to design a framework of the defense framework, to understand the work of the defense in a high-level. Through the combination of active defense and the signature technology to prevent and curb the unknown Ferry horse or derived ferry.The main innovation is that: (1) put forward the concept of Ferry horse attacks; (2) research and design the Ferry horse prototype from the act against; (3) research on the attacks based on the virtual environment; (4) to extract the Ferry horse defense framework, and in accordance with its derivative Ferry horse, summarized the depth three-dimensional defense system.
Keywords/Search Tags:Ferry Horse, Attack Prototype, Virtual Environment, Defense Framework
PDF Full Text Request
Related items