Font Size: a A A

Asynchronous The Trojans Systems Design And Technology Research

Posted on:2007-11-01Degree:MasterType:Thesis
Country:ChinaCandidate:W L WangFull Text:PDF
GTID:2208360182479060Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
In the recent years, malicious codes including Trojan, worm, virus, DDoS, spam, phishing, backdoor, rootkit, and spyware have threatened network information security, and more and more countries paid more attention to take active measures to protect network, and spent a lot of money and people to research and develop network information countermeasures technology .So network information security has related country's security and benefits.Based on the demand of the network warfare and network antiterrorism, we are supposed to construct a network attacking platform both wartime and peacetime. It can achieve important information about military, economic, politic in peacetime, but, destroy the system of enemy and cause a paralysis of network in the wartime.In order to satisfy the demand of network communication warfare in the future, after doing some researches in all kinds of network attacking, we design & implement asynchronous Trojan, and construct a multi-Trojan network-attacking platform, which is supporting asynchronous and asynchronous Trojan communication.The mainly work completed as follows:(1) Analyze the network attacking technology, deeply researched Trojan.(2) Deeply researched Trojan and Bot, Present multi-Trojan system supporting asynchronous and synchronous communication. The key technology: anti-checked and anti-killed about Trojan, Bot spreading and communication and collaborated proxy technology.(3) Design & implement multi-Trojan system. Have tested the primary function of the system, and experimentation have proved that the system worked in order.
Keywords/Search Tags:Network Information Countermeasure, Anti-checked and Anti-killed, Trojan, Bot
PDF Full Text Request
Related items