首页 | 本学科首页   官方微博 | 高级检索  
     

Linux特洛伊木马关键技术研究
引用本文:傅翔华,郭文明,孙涛.Linux特洛伊木马关键技术研究[J].数字社区&智能家居,2009(9).
作者姓名:傅翔华  郭文明  孙涛
作者单位:广州南方医科大学网络中心;
摘    要:在分析木马几项关键开发技术的基础上,设计实现了基于Linux操作系统的特洛伊木马平台。首先对木马进行了概述,进而对主要关键技术进行了研究。开发了抓屏功能,进行了通信的安全实现,最后完成进程的自启动与隐藏。与传统的针对Windows操作系统的木马不同的是,设计的木马不是单纯的客户端/服务端结构,而是在服务端通过后门程序,完成隐藏的功能。

关 键 词:木马  Linux  操作系统  病毒  通信  网络安全  计算机应用  

Key Technology of Linux Trojan Horse
FU Xiang-hua,GUO Wen-ming,SUN Tao.Key Technology of Linux Trojan Horse[J].Digital Community & Smart Home,2009(9).
Authors:FU Xiang-hua  GUO Wen-ming  SUN Tao
Affiliation:Southern Medical University;Network Center;Guangzhou 510515;China
Abstract:Several key technologies for development of Trojan are analyzed, the design and implementation of trojans platform is made on the basis of the Linux operating system. Firstly, key technology of Trojan is studied and summarized. Then the function of the screen grasp programme is developed,as well as the communication security. At last, the hidde-launch thch of the process is developed. Contrast with the traditional Trojans on Windows operating system, the developed Trojan Trojan is not merely a client/server...
Keywords:trojan  linux  operating system  viruses  communication  network security  the computer application  
本文献已被 CNKI 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号