Analysing The Protocol of Network Connection to Apply to Detect Trojans And Backdoors

碩士 === 大同大學 === 資訊工程學系(所) === 94 === It is important problems of the information safety at present that the computer is invaded and attacks on-linly, before damaging recovered even undiscovered ing, its damage arrow is unable to estimate in advance. And it cause the back door wide open to become and...

Full description

Bibliographic Details
Main Authors: Jia-te Wang, 汪佳德
Other Authors: Jin-cheng Lin
Format: Others
Language:en_US
Published: 2006
Online Access:http://ndltd.ncl.edu.tw/handle/00019713901924498438
Description
Summary:碩士 === 大同大學 === 資訊工程學系(所) === 94 === It is important problems of the information safety at present that the computer is invaded and attacks on-linly, before damaging recovered even undiscovered ing, its damage arrow is unable to estimate in advance. And it cause the back door wide open to become and attack one of the means to steal with resources maliciously now that the Trojan horse is slipped into and caused, invador three two pass in and out fast and 2 methods that achieve the goal of monitoring and controlling too usually. A present one is it examine way rely mainly on the fact that the characteristic of the procedure is detected and examined mainly , to undiscovered with want the hidden procedure of back door of Trojan horse very much to detect, as virtue rises on foot vice rises ten all the time, this take place materials leakage and main reason that steal constantly too. Page this through normal Client/Server procedure similar to back door the amount of result kind is it control execution of tool to carry far, compare the difference that its network communication protocol changes, when produce the back door after being invaded , what a communication , the change taking place through the protocol carried on between the persons who knows this procedure and control, detect and measure the possibility planted into the back door .