Font Size: a A A

Trojan Detection Based On Artificial Immune Mechanisms And Defense Technology Research

Posted on:2005-08-14Degree:MasterType:Thesis
Country:ChinaCandidate:L ZhangFull Text:PDF
GTID:2208360125964165Subject:Computer applications
Abstract/Summary:PDF Full Text Request
With a wide usage of Internet, the instrusion events happened continually by the hakers, among which the Trojan horses play an important role acted as a kind of attack tools with invisiblity and enormous damage. Nowdays, the modern society is so dependent on the computer networks that INFORMATION WAR as a new concept attracts great attention paid by our goverment and people. It becomes an urgent problem being solved rapidly to protect the informations of the country and the business. Current computer security system exists many faulties, which give some chances to crack the information system. So it is significant to enhance the research work on the detection and defence to Trojan horses.Because there are many resemblances between the biological immune system and the computer system, and the mechanism of distribution and self-adaption is suggestive to the computer security, so the approaches based on artifical immunology and aimed to instrusion detection and computer viruses has became the forland in the field of the computer security. This paper try to apply the artifical immune mechanism to the detection and defence of Trojan horses, and establish a model system based on artifical immunology to detect and defend the torjan horses.The primary contributions of the dissertation are as follow: Introduction and analysis of new torjan horses's theory,technology and development.Introduction and analysis of the technology of the dectection and defence to the torjan horses.Introduction of the theory and mechanism of the biological immune system.Introduction and analysis of the model system of artifical immunology, emphsis on the model system aim to the computer security field.Establishment of a model system to the detection and defence against the Trojan horses based on the artifical immunology.At the end of the thesis is the conclusion, and some improvement advice and solvent are given.
Keywords/Search Tags:network security, torjan horse, artifical immune, computer virus, instrusion detection
PDF Full Text Request
Related items