期刊文献+

木马的防范与清除技术研究

Technical Research of Prevention and Removal of Trojan Horse
下载PDF
导出
摘要 特洛伊木马常被用作网络系统入侵的重要工具和手段,它已经涉及到了计算机系统及网络安全的各个方面。介绍了木马的基本原理、及其入侵的手段,提出了针对木马入侵的防范措施和清除方法。 Trojan horse which is often used as an important tool for network intrusion has been involved in the various aspects of the computer system and network security. The paper introduces the basic principles of the Trojan horse and the means of invasion, trojan preventive measures against the invasion is proposed.
出处 《软件导刊》 2006年第12期65-67,共3页 Software Guide
关键词 木马 入侵 客户/服务器 Trojan horse invasion C/S
  • 相关文献

参考文献2

二级参考文献8

  • 1李俊平,梅洪,单家元.基于Linux的实时平台的研究[J].微计算机信息,2005,21(06Z):21-23. 被引量:15
  • 2Dasgupta D. Immunity-based intrusion detection system: a general framework [C]. Proceedings of the 22nd National Information Systems Security Conference, NIST Publishers, Crystal City, 1999.
  • 3Kim J, Bentley P. The artificial immune model for network intrusion detection[C]. 7th European Conference on Intelligent Techniques and Soft Computing. Aachen, Germany, 1999. 13-19.
  • 4Kim J, Bentley P. Negative selection and niching by an artificial immune system for network intrusion detection[C].GECCO' 99, Orlando, Florida, 1999.
  • 5Forrest S, Perelson A, Allen L, et al. Self-nonself discrimination in a computer[C].In: Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy, 1994, 202-212.
  • 6Forrest S, Hofmeyr S, Somayaji A, et al. A sense of self for unix processes[C]. Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy, 1996. 120-128.
  • 7W.Richard Stevens.Unix网络编程:第一卷.1999,北京:清华大学出版社.
  • 8devik.Linux on-the-fly kernel patching without LKM.2001,11.

共引文献14

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部