摘要
在网络安全中,越来越多的系统受到木马攻击,网络安全受到极大的冲击。本文作者希望通过对木马的攻击机制、攻击特点、攻击力、攻击步骤、伪装方法、传播途径、启动方式等进行全面的剖析,力求寻找在伪装、传播、启动等方面的共性,以进一步研究、制订出一整套新的、简便的、具有可操作性的木马检测、清除、诱捕及其防御策略。
In network security, a growing number of systems are attack by Trojan norse, network security snock,The authors hope that through Trojan horse attack mechanisms, Trojan horse attack characteristics, Trojan horse attack capability, Trojan horse attacks steps, Trojan horse camouflage methods, Trojan horse communication channels, Trojan horse of a way of a comprehensive analysis aimed at finding in camouflage, dissemination, activated areas common to further research, develop a new, user-friendly, workable Trojan horse testing, removal, entraps and defense strategy.
出处
《三明学院学报》
2006年第4期433-438,共6页
Journal of Sanming University
关键词
网络安全
木马
伪装
检测
清除
诱捕
防范
Network security
Trojan horse
Camouflage
Testing
Clearance
Entraps
Preventing