木馬技術(shù)研究及反彈木馬系統(tǒng)的設(shè)計與實現(xiàn)
[Abstract]:In the 21 ~ (th) century, network life gradually became the theme of people's daily life. At the same time, we should also see that the network brings a lot of convenience to the people of our country, but also brings many problems of information security. Among them, Trojan horse is one of the important hidden dangers that threaten current network information security. Trojans attack computer system vulnerabilities, steal critical information from individuals and enterprise users, and may destroy network resources. Nowadays, with the continuous development of network technology and the upgrading of Trojan horse technology, it has brought great influence and harm to people's production and life. Therefore, it is of great significance to strengthen the research of Trojan horse technology and how to improve the related detection and defense technology to quickly discover Trojan horse, predict and predict Trojan horse, and actively deal with Trojan horse. Firstly, the paper systematically studies, analyzes, summarizes and sums up the key technologies used in Trojan horse program, including its working principle, realization mode and current popular Trojan horse technology. Secondly, on the basis of decomposing the key technologies, based on the workflow of Trojan horse, the Trojan horse behavior is divided into four main processes: implantation stage, hidden stage, communication stage and startup stage. And the emphasis on each stage of the use of technology for serious analysis. At the same time, the development trend of modern Trojan horse to make a reasonable prediction. Finally, combining with the popular remote thread injection technology and rebound port technology, this paper presents the design and implementation of a rebound port Trojan horse system. Among them, Trojan horse server uses remote thread injection technology to achieve hidden purpose, and uses associated file to start with text file. Based on the TCP/IP protocol system, the rebound port Trojan system establishes the communication, obtains the connection information by reading and writing the online FTP server files, and realizes the connection function of the rebound port. The client adopts the interface management method to realize the CMD command control of the server. The system is designed and developed on the basis of windows operating platform, which can be hidden and implanted in controlled computer, realize the process free startup and active connection of controlled end, which truly reflects the working principle of rebound port Trojan horse. To provide a certain reference for the study of the same kind of Trojan horse.
【學位授予單位】:云南大學
【學位級別】:碩士
【學位授予年份】:2014
【分類號】:TP393.08
【共引文獻】
相關(guān)期刊論文 前10條
1 劉晉輝;;計算機病毒技術(shù)分析[J];兵工自動化;2012年01期
2 周亞萍;;U盤病毒的分析及研究[J];才智;2009年20期
3 高凱鵬;周偉;;網(wǎng)絡(luò)信息系統(tǒng)的安全問題及對策[J];吉林大學學報(地球科學版);2008年S1期
4 董照剛;;淺析校園網(wǎng)病毒的防治[J];成才之路;2009年33期
5 敬銳;甘剛;;Win32平臺下PE病毒研究、實現(xiàn)及防范[J];成都信息工程學院學報;2007年S1期
6 楊輝軍;;一個改進的蠕蟲傳播模型研究[J];長江大學學報(自然科學版)理工卷;2009年04期
7 張瑜;李濤;吳麗華;彭小寧;覃仁超;;計算機病毒演化模型及分析[J];電子科技大學學報;2009年03期
8 趙相和;王雋;劉躍;;電廠局域網(wǎng)計算機病毒防治措施[J];電力系統(tǒng)通信;2008年10期
9 楊明明;孔靚;;計算機病毒及防范措施簡介[J];電腦學習;2010年01期
10 趙長軍;李梓;;計算機病毒的危害與防護[J];電腦學習;2010年06期
相關(guān)博士學位論文 前1條
1 任建國;計算機病毒的網(wǎng)絡(luò)傳播機制:三個新型的動力系統(tǒng)模型[D];重慶大學;2012年
相關(guān)碩士學位論文 前10條
1 賈晉峰;山西農(nóng)村網(wǎng)絡(luò)文化站IT管理平臺的分析與設(shè)計[D];北京郵電大學;2011年
2 趙麗娟;Fuzz安全測試技術(shù)研究[D];北京郵電大學;2011年
3 王松;基于學習的惡意網(wǎng)頁智能檢測系統(tǒng)[D];南京理工大學;2011年
4 莫櫻;基于病毒行為分析的特征碼的提取與檢測[D];電子科技大學;2011年
5 任廣明;盜號木馬攻擊與防范技術(shù)的研究實施[D];山東大學;2011年
6 楊坤;數(shù)據(jù)挖掘方法的即時通訊工具病毒檢測研究[D];長春理工大學;2011年
7 蔣曉峰;面向開源程序的特征碼免殺與主動防御突破研究[D];上海交通大學;2011年
8 岳峰;基于動態(tài)模糊神經(jīng)網(wǎng)絡(luò)的程序行為惡意性判定關(guān)鍵技術(shù)研究[D];解放軍信息工程大學;2010年
9 葛長濤;Win32 PE文件病毒行為分析與檢測[D];解放軍信息工程大學;2010年
10 王挺;一種信息戰(zhàn)中的注入式可執(zhí)行文件攻擊技術(shù)的研究[D];華中科技大學;2010年
,本文編號:2189598
本文鏈接:http://www.sikaile.net/guanlilunwen/ydhl/2189598.html