Font Size: a A A

The Model And Technology Of Three-Levels Trojan Horse Based On Software Agent

Posted on:2012-03-18Degree:MasterType:Thesis
Country:ChinaCandidate:J G KanFull Text:PDF
GTID:2218330362460295Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
In order to gain the initiative against the needs to guarantee the information security, it is necessary to develop new network attack techniques and related tools. Network attack tool has become a hot research in the information security area. Trojans are popular in network attack. Traditional Trojans have several deficiencies like weakness in survival. Therefore, in order to improve the attack efficiency, it is necessary to enahance the architecture, mechanism and technologies. The situatedness, autonomy and social interaction of software agent technology seem an effective way to deal with the above problems. The thesis conducts researches on Trojan model and technology to improve its capability in survival.The contribution is summaried as follows.First, traditional Trojan and its deficiency in survival are investigated. Especially, the causes are analyzed. A new three-level architecture that is based on software agent technology is proposed. The implementation architectures of various agents in the model are designed.Second, several key technologies are put forward in order to improve the survival capability of Trojan based on software agent three layer structure of Trojan, including asynchronous control technology, perception of environmental self-adjustment technology, collaborative technology and anti-killing technology to hide, and gives a detailed design and implementation of the main module.Lastly, a Trojan prototype has been successful developed based on the above model and technologies. A Trojan server processing software tool is also developed to achieve the anti-killing of Trojan server.A case is studied to illustrate the effectiveness and feasibility of model and key technologies.
Keywords/Search Tags:Trojan horse, Network attack, Software of Agent technology, Self-evolving
PDF Full Text Request
Related items