期刊文献+

下一代木马的关键技术方向探究 被引量:4

The Next Generation of Key Technology Direction of Trojan
下载PDF
导出
摘要 研究下一代木马技术的原理和发展方向,是当前计算机安全领域亟待解决的问题,也是未来信息对抗中掌握网络控制主动权的重要环节。根据木马程序多年发展中技术和功能不断演进的趋势,在深入分析目前常见木马的工作机制、主要技术手段以及反木马检测技术手段的基础上,预设一个由主控端群、被控端群和服务中心三部分组成的下一代木马体系结构模型。基于该模型的功能和特点,重点对公钥+私钥的远程控制体系结构、全新的特征隐藏、复杂的通信协议和跨平台执行中所涉及的关键技术进行了分析研究。 Research of next generation Trojan technology principle and development direction,is the field of computer security problems to be solved,but also the future of information confrontation in the master network control initiative the important link.According to the Trojan program after years of development in technical and functional evolution trends,in-depth analysis of current common Trojan working mechanism,main technical means and anti Trojan detection technology based on means,a preset by the main control end group,accused the end group and service center is composed of three parts of the next generation of Trojan horse system structure model.Based on the model of the functions and features,focusing on Key + the private key of the remote control system structure,new features of hiding,complex communication protocol and cross-platform implementation of the key technology was analyzed.
出处 《信息网络安全》 2012年第12期39-41,共3页 Netinfo Security
关键词 木马程序 远程控制 特征隐藏 通信协议 服务中心 trojan horse programs remote control characteristics of hidden communication protocol service center
  • 相关文献

参考文献6

二级参考文献25

共引文献71

同被引文献37

  • 1陈友,沈华伟,李洋,程学旗.一种高效的面向轻量级入侵检测系统的特征选择算法[J].计算机学报,2007,30(8):1398-1408. 被引量:46
  • 2王硕,周激流,彭博.基于API序列分析和支持向量机的未知病毒检测[J].计算机应用,2007,27(8):1942-1943. 被引量:21
  • 3Cutler, Terry. The Anatomy of an Advanced Persistent Threat'.Security Week, 6 Dec 2010.Accessed Jun 2011. <http://www.securityweek.com/ anatomyadvanced-persistent -threat >.
  • 4Bejtlich, Richard. Understanding the advanced persistent threat. 2(110 ]cited May 7 2011]. Available from http://searchsecurity.techtarget. com/magazineContent/Understanding-the-advanced-persistent-threat (accessed 7 May 2011).
  • 5sKyWIper Analysis Team. sKyWlper (a,k.a. Flame a.k.a. Flamer): A complex malware for targeted attacks. Laboratory of Cryptography and System Security (CrySyS Lab), 2012.
  • 6Hoglund G, Butler J. Rootkits: Subverting the Windows Kernel[M]. California: Addison Wesley Professional, 2005.
  • 7Desheng Fu, Shu Zhou, Chenglong Cao. A Windows Rootkit Detection Method Based on Cross-view[C]. E-Product E-Service and E-Entertainment (ICEEE), 2(110: 1-3.
  • 8Eugene Rodionov. TDL3:The IZootkit of All Evil[R]. Moscow: ESET, Derbenevskaya nab., 2BI{L.
  • 9Ace Portuguez.The Case of Trojan DownLoader "TDL3" [R]. Finland: F Secure, 2(}1{}.
  • 10端木庆峰,王衍波,张凯泽等.基于PE文件资源数据的信息隐藏方案[D].南京:解放军理工大学通信工程学院,2009.

引证文献4

二级引证文献19

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部