Font Size: a A A

Research And Development Of Special Network Penetration Based On B/S Architecture

Posted on:2015-09-01Degree:MasterType:Thesis
Country:ChinaCandidate:T B LiFull Text:PDF
GTID:2298330467463285Subject:Computer technology
Abstract/Summary:PDF Full Text Request
Internet Security incidents occur frequently today, information disclosure happens everyday. Network penetration programs often stand in the dark corner of the network, the security of the information can not be protected effectively, it has now become the most important issue of Internet security.Special network penetration refers to transfer information in a special way,the way of information transmission include data encryption and data compression. Trojan is the most important form of Internet security threats. The emergence and development of Trojan followed the pace of the Internet. Trojan always fight with the security management strategy at the same age. There are many ways of Trojan penetration in special internet penetration.With develop of today’s Internet web technology. The new architecture model can be a new research direction of Trojan study.For the above situation, this paper focus on the structure of Trojan, Merge the B/S architecture features and C/S architecture features. The main work of this paper have following aspects:Analysis the features and characteristics of Trojans in multiple point. Contrast C/S and B/S architecture, analyzes B/S Trojans running mode, and program design and implementation. Study basic communication knowledge of the data format and design the regulate operations of data transmission. In the view of Trojan survivability, Analysis simple means to avoid being killed.The main achievement of the paper is B/S architecture of the data communication, and design a number of functional modules including access to file information, access to system services, keyboard records of the target host, basic system information and so on. The future trend of the information transmission will be browser/server architecture.
Keywords/Search Tags:Internet penetration, Trojans, B/S architecture, remotecontrol
PDF Full Text Request
Related items