期刊文献+

内网监控系统自保护技术的研究与实现

Research and Implementation of the Self-Protection Technology of Internal Network Monitoring System
下载PDF
导出
摘要 研究内网安全监控系统的自我保护技术,对常见的隐藏进程的方法进行比较分析,设计一个采用拦截系统服务分配表隐藏进程方法的自保护模块,实现系统的自保功能,并给出具体实现代码。 Researches on the self-protection technology of internal network security monitoring system, analyses and compares the current methods of hiding process, designs a self-protection module using Hook SSDT method, realizes self-protection function of the network security monitoring system, and finally gives a concrete realization of the code.
作者 邓志辉 凌捷
出处 《现代计算机》 2009年第12期37-40,共4页 Modern Computer
基金 广东省自然科学基金项目(No.9151009001000043) 广东省科技攻关项目(No.0911050400004)
关键词 自保护技术 监控系统 进程隐藏 Self-Protection Technology Monitoring System Process Hide
  • 相关文献

参考文献5

  • 1李焕洲,胡勇,张健,林宏刚,陈麟.基于终端资源的内网监控系统研究与实现[J].四川大学学报(工程科学版),2007,39(4):118-123. 被引量:2
  • 2刘强,邓亚平,徐震,董世蓉,殷科.隐藏木马检测技术的研究[J].计算机工程,2006,32(1):180-182. 被引量:8
  • 3EffreyRichter[美]著.王建华,张焕生,侯丽坤等译.Windows核心编程[M].北京:机械工业出版社,2000:45-76,463-474.
  • 4Prasad Dabak, Milind Borate, Sandeep Phadke.Undocumented Windows NT .Oreilly & Associates Inc ,2000.
  • 5MicrosoftCorporation[美]著.冯博琴,朱丹军,薛涛等译Windows2000驱动程序开发大全[M].北京:机械工业出版社.2001:278-448.

二级参考文献15

  • 1肖龙,戴宗坤.信息系统风险的多级模糊综合评判模型[J].四川大学学报(工程科学版),2004,36(5):98-102. 被引量:35
  • 2Beyah R A, Holloway M C, Copeland J A. Invisible Trojan: An Architecture, Implementation and Detection Method[C]. In: The 2002 45^th Midwest Symposium on Circuits and Systems, 2002-08.
  • 3Debbabi M, Girard M, Poulin L, et al. Dynamic Monitoring of Malicious Activity in Software[C]. In: Symposium on Requirements Engineering for Information Security, Indianapolis, Indiana, USA,2001-03.
  • 4Cunningham R K, Lippmann R P, Webster S E. Detecting and Displaying Novel Computer Attacks with macroscope Systems[J].IEEE Transactions on Man and Cybernetics, 2001,3(4):275-285.
  • 5Proctor N, Wong R.The Security Policy of the Secure Distributed Operating System Prototype[C]. In: Computer Security Applications Conference, Fifth Annual, 1989:95 - 102.
  • 6Bergeron J, Debbabi M, Desharnais J. Static Detection of Malicious Code in Executable Programs[C]. In: Symposium on Requirements Engineering for Information Security, Indianapolis, Indiana, USA,Springer Verlag, 2001-03.
  • 7Salois M, Charpentier R. Dynamic Detection of Malicious Code in COTS Software[C]. In: Commercial Off-The-Shelf Products in Defence Applications "The Ruthless Pursuit of COTS",Neuilly-sur-Seine Cedex, France, NATO, RTO, 2000-04.
  • 8Weber M, Schmid M, Schatz M, et al. A Toolkit for Detecting and Analyzing Malicious Software[C]. Computer Security Applications Conference, Proceedings. 18^th Annual, 2002-12:423-431.
  • 9Oney W.Programming the Microsoft Windows Driver Model[M].2nd Ed.Microsoft Press,2002.
  • 10许霆,袁萌,史美林.网络监控审计系统的设计与实现[J].计算机工程与应用,2002,38(18):149-150. 被引量:13

共引文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部