期刊文献+

特洛伊木马防范技术探析 被引量:4

The Analysis on Prevention technology to the Trojan horse
原文传递
导出
摘要 特洛伊木马作为黑客常用的一种攻击工具,对计算机网络安全构成严重威胁。深入地研究木马技术,对防范木马攻击具有重要意义。本文介绍了木马的定义和功能及其工作原理,重点分析了木马的种植方式和隐藏技术,并对木马攻击提出了相应的清除方法和防范措施。 Trojan horse is used as a commonly attack tools by hackers,which poses a serious threat to computer network security.We can control the Trojan horse from the research of Trojan horses.The paper introduces the definition and function of Trojan horse and its working principle,analyzes the planting techniques and the concealing technology of Trojan horse,and gives the appropriate removal methods and preventive measures for those typical Trojan horse attack.
机构地区 山东师范大学
出处 《网络安全技术与应用》 2010年第10期29-31,28,共4页 Network Security Technology & Application
关键词 特洛伊木马 隐藏技术 网络安全 防范措施 Trojan horse concealing technology Network Security Guarding measures
  • 相关文献

参考文献3

二级参考文献16

  • 1张新宇,卿斯汉,马恒太,张楠,孙淑华,蒋建春.特洛伊木马隐藏技术研究[J].通信学报,2004,25(7):153-159. 被引量:43
  • 2ADLEMAN L M. An abstract theory of computer viruses[A]. 8th Annual International Cryptology Conference[C]. Santa Barbara, California, USA, 1988.
  • 3COHEN F. Computer viruses: theory and experiments[J]. Computers and Security, 1987, 6(1): 22-35.
  • 4COHEN F. On the implications of computer viruses and methods of defense[J]. Computers and Security, 1988, 7(2):167-184.
  • 5COHEN F. A Cryptographic checksum for integrity protection[J]. Computers and Security, 1987, 6(6): 505-510.
  • 6COHEN F. Models of practical defenses against computer viruses[J]. Computers and Security, 1989, 8(2): 149-160.
  • 7THIMBLEBY H, ANDERSON S, CAIRNS P. A framework for modelling trojans and computer virus infection[J]. The Computer Journal, 1998, 41(7): 444-458.
  • 8THOMPSON K. Reflections on trusting trust[J]. Communication of the ACM, 1984, 27(8): 761-763.
  • 9EGGERS K W, MALLETT P W. Characterizing network covert storage channels[A]. Aerospace Computer Security Applications Conference[C]. Orlando, FL, USA, 1988.
  • 10AHSAN K, KUNDUR D. Practical data hiding in TCP/IP[A]. Proc Workshop on Multimedia Security at ACM Multimedia[C]. French Riviera, 2002.

共引文献65

同被引文献9

引证文献4

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部