Font Size: a A A

AHP Based Evaluation Model For Harms Of Trojan

Posted on:2013-03-02Degree:MasterType:Thesis
Country:ChinaCandidate:Y LiFull Text:PDF
GTID:2248330392456891Subject:Computer technology
Abstract/Summary:PDF Full Text Request
With the development of the computer technology, networks are widely used in ourdaily life. While enjoying the convenience brought about by the network, we have to bearthe risk as well. More and more important information such as credit card information andonline transaction information are stored on the computer. Designed to steal the importantinformation of targeted computer, Trojan, as one kind of malicious software, is flood allover the world. With no doubt, it’s a great threat to the information security.The existed virus harm measurement didn’t fully take the unique characters ofTrojan into concern. They mainly focus on virus. So, analyze the Trojan attacking processand find out the factors which influence on the harm of Trojan is important. With the helpanalysis and comparison of those factors, we could enhance defense and remove worktarget to Trojan.First, analyze the main process of Trojan attack and collect the main Trojantechnology and Trojan defense technology. Secondly, analyze some Trojan sample to findout all the important factors of Trojan’s harm. With analysis all the factors could be sortinto four groups. And then, based on the Analytic Hierarchy Process method, try tomeasure every factor’s influence on the harm of Trojan attack. Then design and implementTrojan harm measurement system. Finally, some chose Trojan Sample are used to test thesystem. Compared with the experts opinion the result is corresponded with expect.
Keywords/Search Tags:Trojan, Analytic Hierarchy Process, Harm Measurement, Computer Security
PDF Full Text Request
Related items