木马隐藏技术初探  被引量:2

Primary Exploration of Trojan Horse Hiding Technique

在线阅读下载全文

作  者:张洪进[1] 

机构地区:[1]解放军92医院信息科,福建南平353000

出  处:《医疗卫生装备》2011年第4期89-91,96,共4页Chinese Medical Equipment Journal

摘  要:目的:分析木马技术,提出针对性防御措施。方法:通过一个简单木马的设计和实践,对木马的植入技术、隐藏技术、检测技术、发展方向进行了深入全面论述。结果:设计的简单木马成功实现了预想功能。结论:木马的特性决定了检测防御的难度,防范重点在于网络管理措施,而不是检测技术。Objective To analyze Trojan Technique and present recovery measures against it.Methods By practicing the design and implementation of a simple Trojan Horse,this article fully discussed and penetrated into every corner of the injecting technique,the hiding technique,the detecting technique and the way forward of Trojan Horse.Results The simple Trojan Horse designed in this article had successfully realized the expected functions.Conclusion The character of Trojan determines the difficulties of detecting and recovery against it.The guarding emphasis should be laid on the network management measures,not the detecting technique.

关 键 词:木马 隐藏技术 DLL注入 检测防御 

分 类 号:TP393.08[自动化与计算机技术—计算机应用技术]

 

参考文献:

正在载入数据...

 

二级参考文献:

正在载入数据...

 

耦合文献:

正在载入数据...

 

引证文献:

正在载入数据...

 

二级引证文献:

正在载入数据...

 

同被引文献:

正在载入数据...

 

相关期刊文献:

正在载入数据...

相关的主题
相关的作者对象
相关的机构对象