首页 | 本学科首页   官方微博 | 高级检索  
     

木马研究综述
引用本文:黎国保,李世雄. 木马研究综述[J]. 适用技术之窗, 2010, 0(11): 62-66
作者姓名:黎国保  李世雄
作者单位:[1]海军驻平坝地区航空军代室,贵州平坝561102 [2]海军驻昆明地区军代室,云南昆明264001
摘    要:木马是一种具有悠久传统且不断更新的网络攻击方式,随着网络技术的发展,木马出现了很多新的攻击和生存模式,对互联网安全造成了很大的危害。本文介绍了木马的基本定义,分析了其工作机制和功能结构,着重讨论了其植入、隐藏和检测方式,指明了其发展趋势。

关 键 词:木马  木马植入  木马隐藏  木马检测

Overview of Trojan Horse
Li Guobao Li Shixiong. Overview of Trojan Horse[J]. Science & Technology Plaza, 2010, 0(11): 62-66
Authors:Li Guobao Li Shixiong
Affiliation:Li Guobao Li Shixiong(1.Naval Aeronautical Military Representative Office in Pingba Areas,Guizhou Pingba 561102;2.Naval Military Representative Office in Kunming Areas,Yunnan Kunming 650000)
Abstract:Trojan is a kind of long tradition and constantly updated network attacks,with the development of network technology,there have been many new Trojan attacks and survival modes,which brings a significant safety hazard to the Internet.The paper introduced the basic definition of Trojan and also the mechanism and functional structure of its work,focusing on its inception,concealing and detection methods,pointing out its development trend.
Keywords:Trojan Horse  Trojan Inception  Trojan Concealing  Trojan Detection
本文献已被 维普 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号