期刊文献+

基于云计算的木马检测技术探究

Research of Trojan horse detection technology based on Cloud Computing
下载PDF
导出
摘要 在当前的时代背景下,木马病毒种类越来越多,同时功能也越来越多,危害也越来越大。在这个IT行业里人们生活越来越近的时代,人们发现计算机互联网也不再神秘。人们依靠互联网购物,缴费,旅游,租房,交友,娱乐等等,可以说是人们的生活已经变得离不开互联网了。但是在这个互联网急速发展的信息时代,原来只是广大计算机病毒种类中的小角色似乎也依靠自身先天性的特点,也跟随着这个互联网发展的浪潮急速成长为互联网生活中危害最大最广的威胁。传统的木马检测方法已经很难适应目前木马病毒的更新速度和数量的增速。改进传统的木马检测手段成为目前最迫切的需求。本论文就是根据这个背景,通过对传统检测手段的分析和学习,并借鉴目前比较先进的云计算解决方案设计实现了一个新的木马检测系统平台。 In the context of the current era,more and more types of Trojan virus,also more and more features,more and more danger.In the IT industry in the people's life more and more recent times,they find that the computer Internet is no longer mysterious.People rely on Internet shopping,payment,tourism, housing,friends,entertainment and so on, can be said to be the life of people has become cannot do without the Internet.But the rapid development in the era of Internet information,originally only a small part of the computer virus species seems to depend on its own characteristics of congenital,along with the rapid growth of Internet development tide to harm the largest and most widely threats to Internet life. <br> The traditional method of Trojan horse detection has been difficult to adapt to the current update speed and number of Trojan virus growth.Improved the traditional means of Trojan horse detection has become the most urgent demand.This paper is based on this background,through the analysis and study of traditional detection methods,and draw lessons from the advanced cloud computing solutions to design and implement a new Trojan detection system platform.
作者 张晓
出处 《电子测试》 2014年第7X期69-72,75,共5页 Electronic Test
关键词 云计算 木马检测 分布式 cloud computing Trojan detection distributed
  • 相关文献

参考文献3

二级参考文献10

  • 1新型病毒与新的反病毒策略.2005.
  • 2喻凯.病毒发展趋势及对策.2005.
  • 3Stichbury J. Symbian OS Explained [M]. Symbian Press, 2004-12.
  • 4Harrison R. Symbian OS C++ for Mobile Phones(Volume 2)[M].Symbian Press, 2004-08.
  • 5Digia. Programming for the Series 60 Platform and Symbian OS[M].Symbian Press, 2002-11.
  • 6Jipping M J. Symbian OS Communications Programming[M].Symbian Press, 2002-06.
  • 7Helsinki A K. Security Comparison of Mobile Oses[Z]. http://citeseer.csail.mit.edu/673680.html.
  • 8Muller G. Communicating via CAFCR: Illustrated by Security Example[Z]. http://citeseer.csail.mit.edu/597105.html,
  • 9Edlund J. Epoc Visual Builder[Z]. http://citeseer.csail.mit.edu/edlund01 epoc.html.
  • 10Freudenthal M, Heiberg S, Willemson J. Personal Security Environment on Palm (PDA) [Z]. http://citeseer.ist.psu.edu/freuden tha100personal.html.

共引文献21

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部