Font Size: a A A

Study And Implementation Of Trojan Horse Hiding Method

Posted on:2013-02-12Degree:MasterType:Thesis
Country:ChinaCandidate:F CaoFull Text:PDF
GTID:2248330395974690Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the continuous development of the computer technology, related applicationhas been integrated into all areas of modern society.At the same time, the technology ofattacking computer systems develops as well for different purposes. Especially,sincethe latest decade, the Trojan technology,which can represent the computer attackingtechniques,makes a great threat to the security of computers worldwide. Whileconstantly improve the security capacity of its important information department,countries all over the world also emphasize on researching the computer attackingtechniques as a new type of attacking weapons. Among the numerous attackingtechniques and malicious codes, the Trojan technology appears earlier and it is moremature. Because of its having a strong latent and keeping-control capacitysimultaneously as well as its thorough penetration and information theft to the targethost, it occupies a pivotal position among all these technologies, and is one of the keytechnologies to research.As a mature malicious code which has been used for many years,the Trojan hasbecome a major weapon in the network attack due to its huge destructive power, strongdisguise and easiness to realize.To cater for the demand of the network warfare, thisarticle analyzes and summarizes various Trojan attacking technologies at present,emphasizes on the hidden technology, and finally designs and realizes aport-bounce-back Trojan based on the traditional Trojan technology.The main works completed are as follow:(1) It briefly introduces various network attacking technologies which applieswidely at the moment, then elaborates in detail the Trojan technology.(2) It has discussed and deeply studied the Trojan technology,including itsdevelopment,characteristics,key skills and its future.(3) It uses different Trojan techniques in a serious of vital technologies on thebasis of summarizing their different characteristics while according to the practicalsituations.Then it integrates all these technologies to finally design and implement a port-bounce-back Trojan,which possesses a strong latent and keeping-control capacity.(4) It raises some suggestions after reflection to prevent from Trojan attack,according to the content introduced above.Then it sums up,analyzes the designedTrojan,finds its deficiencies and the way of improvement.All in all, I made an outlook to the sequences after its finish....
Keywords/Search Tags:Network Information Countermeasure, Trojan, Hidden, Defense
PDF Full Text Request
Related items