期刊文献+

木马威胁及应对策略研究

Research on Trojan Threating and Countermeasure
在线阅读 下载PDF
导出
摘要 介绍了木马的工作机理及其主要威胁,提出了事前积极防护、事中全面监测、事后应急处理的安全纵贯线的应对策略。 This paper introduced the operating principle of Trojan Horse and it' s main threats, proposed coping strategies that include pre - product active protection, in - product comprehensive detection, ex - product emergency treatment of security main line.
出处 《武警学院学报》 2013年第4期95-96,共2页 Journal of the Armed Police Academy
关键词 木马 网络攻击 对策 Trojan Horse cyber - attacks countermeasure
  • 相关文献

参考文献5

二级参考文献21

  • 1刘敬轩,戴英侠.基于NDIS的IPSec VPN客户端的设计与实现[J].信息安全与通信保密,2006,28(12):191-194. 被引量:3
  • 2邓吉.黑客攻防实践入门[M].北京:电子工业出版社,2008,6.
  • 3HOLUND Greg, BUTLER James. Rootkit: Subverting the Windows Kernel[M]. [s.l.]: Addison Wesley Professional, 2006." 281-344.
  • 4BAISHAKHI Ray, SHIVAKANT Mishra. Secure and Reliable Covert Channel[C]//ACM. Proceedings of The 4th Annual Workshop on Cyber Security and Information Intelligence Research. New York : ACM Publications, 2008 : 01-03.
  • 5张帆,史彩成.驱动开发技术详解[M].北京:电子工业出版社,2009:506-520.
  • 6STEENSON R, SEIFERT C. Capture Client Honeypot[DB/OL]. (2007-09-22) [2008-04-05]. https: //projects.honeynet.org/capture-hpc.
  • 7诸葛建伟,韩心慧,叶志远,邹维.僵尸网络的发现与跟踪[A].全国网络与信息安全技术研讨会(NetSec’05)[C].北京,2005.
  • 8RAJAB M A, ZARFOSS J, MONROSE F, et al. A multifaceted approach to understanding the botnet phenomenon[A]. Proceedings of the 6th ACM Internet Measurement Conference (IMC'06)[C].Rio de Janeriro, Brazil, 2006. 41-52.
  • 9WICHERSKI F C, HOLZ T, WICHERSKI G. Botnet tracking: exploring a root-cause methodology to prevent distributed denial-of- service attacks[A]. Proceedings of the 10th European Symposium on Research in Computer Security (ESORICS'05)[C]. Springer, Milan, Italy, 2005. 319-335.
  • 10BAECHER E HOLZ T, KOETTER M, WICHERSKI G. Know your enemy: tracking bothers, using honeynets to learn more about Bots [EB/OL]. http://www.honeynet.org/papers/bots/, 2005, 2007.

共引文献18

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部