Font Size: a A A

Trojan Horse Attacks And A New Type Of Trojan Detection Technology

Posted on:2010-04-03Degree:MasterType:Thesis
Country:ChinaCandidate:R Q HeFull Text:PDF
GTID:2198360275968103Subject:Control theory and control engineering
Abstract/Summary:PDF Full Text Request
Nowadays,with the rapidly development of information technology,human society is entering an information society,social economics' development more and more dependents on the information resources,information technology and information industries.In the information society,information has become valuable resources for human.In recent years,Internet is developing at an alarming rate in the world,and internet technology has been widely penetrated into all fields.At the same time,the phenomenon of cyber-crime occurs from time to time,in fact,the criminals open the target computer's back door through the Trojan document.Trojan is a big threat to the computer system's security confidential,and also caused a large number of economic losses,so we should take more researches for Trojan horse technology, and how to detect the Trojan attack and enhance the network security completely is a hot problem that we need to pay attention urgently.It has an in-depth analysis to Trojan attack and Trojan detection in the paper,and the concrete works is as follows:Firstly,it has made an introduction about the Trojan horse,such as the origin of the Trojan horse,basic features,the development process,working principle and the situation of its prevention.Secondly,it has analyzed some concrete attack technology of the Trojan horse, such as process hideaway technology,automatic start load technology and transmitting data technology.Thirdly,it has researched the related technology of opposition-Trojan horse deeply,and their characteristics.Fourthly,it has analyzed insufficient of the Trojan horse detection technology which by the static characteristic.The Trojan horse detection technology can not detect out the unknown Trojan horse if only by static characteristic;particularly to the Trojan horse which used hidden technology.The detection technology by static characteristic has to rely on the Trojan ware house in detection system.In this paper,by comparing the Trojan horse' static characteristic and dynamic behavioral,it has made a Trojan horse detection technology which has dynamic behavioral analysis and the detection of Trojan horse' static characteristic:It has prevented the Trojan horse by control some Trojan horse' malicious operation to system such as Trojan horse's loading,hiding and transmitting data;It has detected the Trojan horse most effectively by supervising system' register,document,catalogue,port process connection,suspicious for transferring and filter analysis network communication.
Keywords/Search Tags:Trojan Horse, Cryptic Start-up, Process Detection, Network Intrusion
PDF Full Text Request
Related items