期刊文献+

间谍软件生命周期研究

Study of Spyware Lifecycle
下载PDF
导出
摘要 近年来,我国公共互联网快速发展,用户数量已超过1.37亿,互联网的社会基础设施功能表现得越来越明显。随着信息化的不断深入,信息的重要性越来越被大家所认知,以窃取信息为主要目的的间谍软件日益猖獗。本文对间谍软件的生命周期各个阶段进行了研究,并针对各个阶段,探讨了相应的发现和控制技术。 In recent years, rapid development of the Intemet, the number of users has more than 137 million. Internet social infrastructure functions becoming increasingly obvious. As information technology continues to deepen, the importance of information led to the theft of information for the main purpose of spyware increasingly rampant. This discussion study the spyware's lifecycle various stages, and exploring the corresponding detection and control technology.
出处 《信息技术与信息化》 2007年第3期58-60,78,共4页 Information Technology and Informatization
关键词 间谍软件 间谍软件生命周期 间谍软件发现与控制 Spyware Spyware lifecycle Spyware detection and control
  • 相关文献

参考文献5

  • 1Alexander Moshchuk.A Crawler-based Study of Spyware on the Web[J] Proceedings of the 13th Annual Network and Distributed System Security Symposium (NDSS 2006).
  • 2Yi-Min Wang,Roussi Roussev,Chad Verbowski,Gatekeeper:Monitoring Auto-Start Extensibility Points (ASEPs) for Spyware Management,the 18th Large Installation System Administration Conference (LISA'04),Atlanta,GA,pp:33-46,November 2004.
  • 3Neveen Farag Awad,Kristina Fitzgerald.The deceptive behaviors that offend us most about spyware.Communications of the ACM Volume 48,pp:55-60,Number 8 2005.
  • 4Yi-Min Wang,Doug Beck,Binh Vo,Roussi Roussev,ChadVerbowski,and Aaron Johnson.Detecting stealth software with Strider GhostBuster.Technical report,Yokohama,Japan,July 2005.
  • 5Anti-Spyware Coalition.Definitions and Supporting Documents.2006.www.antispywarecoalition.org.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部