首页 | 本学科首页   官方微博 | 高级检索  
     

特洛伊木马隐藏技术分析
引用本文:韩宇,申永军.特洛伊木马隐藏技术分析[J].微计算机信息,2012(1):128-129.
作者姓名:韩宇  申永军
作者单位:兰州大学信息科学与工程学院
摘    要:文章首先介绍了木马的定义,概括了木马的特征—隐蔽性、欺骗性、自启动性和自动恢复性,并简单介绍了木马的结构和功能。随后,从文件隐藏、进程隐藏、通信隐藏、芯片隐藏四个方面介绍了木马的隐藏技术,最后展望了木马技术的发展趋势。

关 键 词:网络安全  木马  木马隐藏

Analysis of Concealing Technology for Trojan Horses
HAN Yu SHEN Yong-jun.Analysis of Concealing Technology for Trojan Horses[J].Control & Automation,2012(1):128-129.
Authors:HAN Yu SHEN Yong-jun
Affiliation:HAN Yu SHEN Yong-jun(School of Information Science & Engineering,Lanzhou University,China)
Abstract:The definition and character of Trojan horse is discussed first in the text,including concealment,cheat,self-start and self-recover,and the structure and function of Trojan horse is also described.Then the hiding technology for Trojan focuses hiding files,hiding processes,hiding communications and hiding chips.Finally,the paper looks into the future trend of Trojan horse.
Keywords:Network Security  Trojan Horse  Trojan Horse concealing
本文献已被 CNKI 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号