首页 | 本学科首页   官方微博 | 高级检索  
     

木马隐藏技术与防范方法
引用本文:许名,杨仝,郑连清,张串绒.木马隐藏技术与防范方法[J].计算机工程与设计,2011,32(2):489-492,496.
作者姓名:许名  杨仝  郑连清  张串绒
作者单位:空军工程大学电讯工程学院,陕西西安,710077
摘    要:为加固网络安全、防范木马攻击,结合实例研究了一种木马隐藏技术,实现了基于加载三级跳和线程守护的隐藏技术,增强了木马的隐蔽性与抗毁性,并提出了该技术相应的防范措施和清除方法。实验结果表明,融入该隐藏技术的木马程序完成了预期的隐藏功能并可以穿透最新的瑞星杀毒软件、瑞星防火墙及硬件防火墙,表明了该隐藏技术的可行性与有效性。

关 键 词:木马隐藏  线程守护  远程线程插入  加载三级跳  木马防范

Concealing technology of Trojan horses and prevention
XU Ming,YANG Tong,ZHENG Lian-qing,ZHANG Chuan-rong.Concealing technology of Trojan horses and prevention[J].Computer Engineering and Design,2011,32(2):489-492,496.
Authors:XU Ming  YANG Tong  ZHENG Lian-qing  ZHANG Chuan-rong
Affiliation:XU Ming,YANG Tong,ZHENG Lian-qing,ZHANG Chuan-rong(Institute of Telecommunication Engineering,Air Force Engineering University,Xi'an 710077,China)
Abstract:To reinforce network security and prevent Trojan horse attacks,a concealing technology by triple jump in load and thread guard is analyzed and implemented with an example,and a Trojan horse using the technology is programmed,and the hidden nature and survivability of the Trojan horse is enhanced by it.Finally,the corresponding cleaning method is put forward.Experimental results show that the Trojan horse completes the expected hidden features,and can penetrate the latest Rising anti-virus software,Rising Fi...
Keywords:Trojan concealment  thread guard  remote thread insert  triple jump in load  Trojan prevention  
本文献已被 CNKI 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号