Font Size: a A A

Design And Implementation Of A System For Scanning And Monitoring Web Backdoor Trojans

Posted on:2011-03-28Degree:MasterType:Thesis
Country:ChinaCandidate:F C YiFull Text:PDF
GTID:2178360305985340Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
WebSite has been implanted trojans,which brings a lot of unnecessary trouble. In order to reduce the crisis, a method of how to design and implement a system for scanning Web Backdoor Trojans is introduced. Its features include scanning Web Backdoor Trojans, website backup,real-time monitoring, file recovery and so on.System uses the signature combination of scanning Characteristic Code and real-time monitoring.In the scanning module, system uses the BM algorithm combined with the KR algorithm; In real-time monitoring module, MD5 value was recorded to monitor whether the file has been tampered with. Experimental results show that the efficiency of the algorithm used in this article is increased by 10% compared with the BM algorithm and KMP algorithm when the length of string is between 15 and 30.System was designed in java computer language. System framework is based on MVC architecture. Hibernate, which is an object-relational persistence mapping (ORM) framework is used in the system.In the design Patterns, Singleton pattern and factory pattern are used in the designing process.
Keywords/Search Tags:trojans, virus, Web Backdoor, characteristic code
PDF Full Text Request
Related items