首页 | 本学科首页   官方微博 | 高级检索  
     

特洛伊木马隐藏技术研究
引用本文:林小进,钱江.特洛伊木马隐藏技术研究[J].微计算机信息,2007,23(33):59-60,40.
作者姓名:林小进  钱江
作者单位:江苏南京 南京工业大学信息科学与工程学院,210009
摘    要:首先介绍了传统的木马隐藏方法,由于传统方法主要集中于本地进程的隐藏,对木马两端之间通信隐藏涉及甚少,而本文所采用的基于ICMP的连接技术能够穿越防火墙,实现通信连接的隐藏。

关 键 词:特洛伊木马  隐藏  ICMP
文章编号:1008-0570(2007)11-3-0059-02
修稿时间:2007-08-032007-10-25

Research on the concealing technology of Trojan horse
LIN XIAOJIN,QIAN JIANG.Research on the concealing technology of Trojan horse[J].Control & Automation,2007,23(33):59-60,40.
Authors:LIN XIAOJIN  QIAN JIANG
Abstract:First, the concealing technology of Trojan horse is introduced,as the traditional method mainly focus on the hiding of local process,seldom involves the communication concealing between the two sides of Trojan horse.But the method of technology based on ICMP mentioned in this paper can penetrate firewall,can realize the hiding of communication.
Keywords:Trojan horse  concealing technology  ICMP
本文献已被 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号