期刊文献+

基于HTTPS隧道防火墙穿透技术研究与探讨 被引量:1

Research and Discussion on Firewall Penetration Technology Based on HTTPS Tunnel
下载PDF
导出
摘要 针对防火墙安全防护特征,将木马程序获取用户数据封装于采用匿名Diffe-Hellman协议的HT-TPS数据包中,实现加密传输,穿透防火墙,同时,利用Restful Web Service技术对木马上传数据进行收集显示,实现高可行性的木马控制通信系统。 Aiming at the characteristics of firewall safety protection, encapsulate the user data got by Trojans into HTTPS packets with anonymous Diffe - Hellman protocol in order to achieve encrypted transmission and to penetrate the firewall. Collect and display the data uploaded by Trojans with Restful Web Service technology to achieve high viable Trojan control communication system.
作者 杨顺韬
出处 《河池学院学报》 2013年第2期86-90,共5页 Journal of Hechi University
基金 广西教育厅科学技术研究项目(200808MS137) 广西高等教育教学改革工程项目(2013JGA341)
关键词 防火墙技术 木马 HTTPS隧道 RESTFUL Diffe-Hellman firewall technology Trojan HTTPS tunnel Restful Diffe - Hellman
  • 相关文献

参考文献4

二级参考文献22

  • 1宋柳松,吴少华,周安民.木马穿透个人防火墙技术研究[J].信息安全与通信保密,2007,29(1):145-147. 被引量:5
  • 2Lamport L. Password Authentication with Insecure Communication[J]. Communications of the ACM, 1981, 24(11): 770 - 772.
  • 3Haller N. The S/KEY One - Time Password System. RFC1760. 1995.
  • 4Gabber E,Gibbons P B, Matias Y, Mayer A. How to Make Personalized Web Browsing Simple, Secure and Anonymous [J]. Proceedings of Financial Cryptography' 97, Anguilla: Springer - Verlag, 1997 : 17 - 31.
  • 5Ross B,Jackson C, Miyake N,et al. Stronger Password Authentication Using Browser Extensions [A]. Proceedings of the 14th USENIX Security Symposium[C]. 2005 : 17 - 32.
  • 6Halderman J A, Waters B, Fehen E W. A Convenient Method for Securely Managing Passwords[A]. Proceedings of the 14th International Conference on World Wide Web [C]. Chiba: ACM Press, 2005 : 471 - 479.
  • 7Yee K P,Sitaker K. Passpet:Convenient Password Management and Phishing Proteetion[A]. Proceedings of the Second Symposium on Usable Privacy and Security[C]. New York: ACM ,2006:32 - 43.
  • 8Gajek S,Sadeghi A R,Stuble C,et al. Compartmented Security for Browsers - or How to thwat a phisher with trusted computing[A]. Proceedings of the 2nd International Conference on Availability,Reliability and Security[C]. Washington DC : IEEE Computer Society, 2007 .. 120 - 127.
  • 9Schneier B. Password SafeE [EB/OL]. http://www, schneier. com/passsafe, html.
  • 10Mark Stamp. Information Security: Principles and Practice [M]. Wiley, 2006.

共引文献4

同被引文献9

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部