首页 | 本学科首页   官方微博 | 高级检索  
     检索      

基于木马攻击机制的防范措施剖析
引用本文:余文琼.基于木马攻击机制的防范措施剖析[J].三明学院学报,2006,23(4):433-438.
作者姓名:余文琼
作者单位:三明学院,数学与计算机科学系,福建,三明,365004
摘    要:在网络安全中,越来越多的系统受到木马攻击,网络安全受到极大的冲击。本文作者希望通过对木马的攻击机制、攻击特点、攻击力、攻击步骤、伪装方法、传播途径、启动方式等进行全面的剖析,力求寻找在伪装、传播、启动等方面的共性,以进一步研究、制订出一整套新的、简便的、具有可操作性的木马检测、清除、诱捕及其防御策略。

关 键 词:网络安全  木马  伪装  检测  清除  诱捕  防范
文章编号:1673-4343(2006)04-0433-06
收稿时间:2006-01-04
修稿时间:2006-01-04

Trojan Horse Attack Mechanism Analysis and Preventive Measures
YU Wen-qiong.Trojan Horse Attack Mechanism Analysis and Preventive Measures[J].Journal of Sanming University,2006,23(4):433-438.
Authors:YU Wen-qiong
Institution:Department of Mathematics and Computer Science, Sanming University, Sanming 365004, China
Abstract:In network security,a growing number of systems are attack by Trojan horse,network security shock.The authors hope that through Trojan horse attack mechanisms,Trojan horse attack characteristics,Trojan horse attack capability,Trojan horse attacks steps,Trojan horse camouflage methods,Trojan horse communication channels,Trojan horse of a way of a comprehensive analysis aimed at finding in camouflage,dissemination,activated areas common to further research,develop a new,user-friendly,workable Trojan horse testing,removal,entraps and defense strategy.
Keywords:Network security  Trojan horse  Camouflage  Testing  Clearance  Entraps  Preventing
本文献已被 CNKI 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号