期刊文献+

木马隐藏技术与防范方法 被引量:7

Concealing technology of Trojan horses and prevention
下载PDF
导出
摘要 为加固网络安全、防范木马攻击,结合实例研究了一种木马隐藏技术,实现了基于加载三级跳和线程守护的隐藏技术,增强了木马的隐蔽性与抗毁性,并提出了该技术相应的防范措施和清除方法。实验结果表明,融入该隐藏技术的木马程序完成了预期的隐藏功能并可以穿透最新的瑞星杀毒软件、瑞星防火墙及硬件防火墙,表明了该隐藏技术的可行性与有效性。 To reinforce network security and prevent Trojan horse attacks, a concealing technology by triple jump in load and thread guard is analyzed and implemented with an example, and a Trojan horse using the technology is programmed, and the hidden nature and survivability of the Trojan horse is enhanced by it. Finally, the corresponding cleaning method is put forward. Experimental results show that the Trojan horse completes the expected hidden features, and can penetrate the latest Rising anti-virus software, RisingFirewall and general hardware firewalls, which demonstrate the feasibility and effectiveness of the concealing technology.
出处 《计算机工程与设计》 CSCD 北大核心 2011年第2期489-492,496,共5页 Computer Engineering and Design
关键词 木马隐藏 线程守护 远程线程插入 加载三级跳 木马防范 Trojan concealment thread guard remote thread insert triple jump in load Trojan prevention
  • 相关文献

参考文献8

  • 1何志,范明钰,罗彬杰.基于远程线程注入的进程隐藏技术研究[J].计算机应用,2008,28(B06):92-94. 被引量:12
  • 2邓璐娟,刘涛,甘勇,熊坤.基于进程鉴别和隐藏的病毒主动式防御技术[J].计算机工程,2007,33(5):117-119. 被引量:12
  • 3Greg Hoglund, James Butler.Rootkits:Subverting the Windows kernel [M]. USA: Addison Wesley Professional Publisher, 2005.
  • 4梁攀新.编程高手箴言[M].北京:电子工业出版社,2005.
  • 5Andy Oram. Peer to peer: Harnessing the power of disruptive technologies[C].O'Reilly,2006:1-4.
  • 6EgesrKW, MallettPW. Characterizing network covert storage channels [C]. Aerospace Computer Security Applications Con- ference,2007:2-6.
  • 7Jones A, Ohlund J. Network programming for Microsoft Win- dows[M].USA:Microsoft Press,2006.
  • 8Ed skoudis Lenny Zelter.决战恶意代码[M].陈贵敏,侯晓慧,译.北京:电子工业出版社,2005.

二级参考文献14

  • 1陈争光.Windows环境下系统进程监视及自动关机的实现[J].电脑编程技巧与维护,2004(11):82-85. 被引量:2
  • 2高惠莉.Visual C++下利用三级跳实现进程的隐藏[J].洛阳工业高等专科学校学报,2005,15(1):46-47. 被引量:1
  • 3杨国强.对付计算机病毒的三个层次[J].网络与信息,2005,19(5):64-65. 被引量:3
  • 4王建华,张焕生,侯丽坤.Windows核心编程[M].北京:机械工业出版社,2001.
  • 5雷校勇,黄小平.Windows RootKit技术原理及防御策略[D].上海:上海交通大学,2006.
  • 6BUTELER J R I L. Detecting compromises of core subsystems and kernel function in Windows NT/2000/XP: M. S. Thesis[ D]. Baltimore County: University of Maryland, 2002.
  • 7DOROTHY E. Denning, information warfare and security[ M]. Boston: Addison Wesley, 2001.
  • 8齐琪.Windows下EPA技术的研究与改进[D].武汉:华中科技大学,2006.
  • 9BUTLER J, JEFFREY L, PINKSON J. Hidden processes: The implication for intrusion detection[ C]//Proceedings of the 2003 IEEE Workshop on Assurance United States Military Academy. West Point: IEEE Press, 2003.
  • 10LEVINE J G, GRIZZARD J B, HUTTO P W, et al. A methodology to characterize kernel level rootkit exploits that overwrite the system call table[ C]// Proceeding of IEEE SoutheastCon. Washington: IEEE Press, 2004:25 - 31.

共引文献22

同被引文献45

引证文献7

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部