Analysing The Protocol of Network Connection to Apply to Detect Trojans And Backdoors
碩士 === 大同大學 === 資訊工程學系(所) === 94 === It is important problems of the information safety at present that the computer is invaded and attacks on-linly, before damaging recovered even undiscovered ing, its damage arrow is unable to estimate in advance. And it cause the back door wide open to become and...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | en_US |
Published: |
2006
|
Online Access: | http://ndltd.ncl.edu.tw/handle/00019713901924498438 |
id |
ndltd-TW-094TTU01392001 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-094TTU013920012015-10-13T11:15:49Z http://ndltd.ncl.edu.tw/handle/00019713901924498438 Analysing The Protocol of Network Connection to Apply to Detect Trojans And Backdoors 連線協定分析運用於偵測木馬後門之研究 Jia-te Wang 汪佳德 碩士 大同大學 資訊工程學系(所) 94 It is important problems of the information safety at present that the computer is invaded and attacks on-linly, before damaging recovered even undiscovered ing, its damage arrow is unable to estimate in advance. And it cause the back door wide open to become and attack one of the means to steal with resources maliciously now that the Trojan horse is slipped into and caused, invador three two pass in and out fast and 2 methods that achieve the goal of monitoring and controlling too usually. A present one is it examine way rely mainly on the fact that the characteristic of the procedure is detected and examined mainly , to undiscovered with want the hidden procedure of back door of Trojan horse very much to detect, as virtue rises on foot vice rises ten all the time, this take place materials leakage and main reason that steal constantly too. Page this through normal Client/Server procedure similar to back door the amount of result kind is it control execution of tool to carry far, compare the difference that its network communication protocol changes, when produce the back door after being invaded , what a communication , the change taking place through the protocol carried on between the persons who knows this procedure and control, detect and measure the possibility planted into the back door . Jin-cheng Lin 林金城 2006 學位論文 ; thesis 60 en_US |
collection |
NDLTD |
language |
en_US |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 大同大學 === 資訊工程學系(所) === 94 === It is important problems of the information safety at present that the computer is invaded and attacks on-linly, before damaging recovered even undiscovered ing, its damage arrow is unable to estimate in advance. And it cause the back door wide open to become and attack one of the means to steal with resources maliciously now that the Trojan horse is slipped into and caused, invador three two pass in and out fast and 2 methods that achieve the goal of monitoring and controlling too usually. A present one is it examine way rely mainly on the fact that the characteristic of the procedure is detected and examined mainly , to undiscovered with want the hidden procedure of back door of Trojan horse very much to detect, as virtue rises on foot vice rises ten all the time, this take place materials leakage and main reason that steal constantly too.
Page this through normal Client/Server procedure similar to back door the amount of result kind is it control execution of tool to carry far, compare the difference that its network communication protocol changes, when produce the back door after being invaded , what a communication , the change taking place through the protocol carried on between the persons who knows this procedure and control, detect and measure the possibility planted into the back door .
|
author2 |
Jin-cheng Lin |
author_facet |
Jin-cheng Lin Jia-te Wang 汪佳德 |
author |
Jia-te Wang 汪佳德 |
spellingShingle |
Jia-te Wang 汪佳德 Analysing The Protocol of Network Connection to Apply to Detect Trojans And Backdoors |
author_sort |
Jia-te Wang |
title |
Analysing The Protocol of Network Connection to Apply to Detect Trojans And Backdoors |
title_short |
Analysing The Protocol of Network Connection to Apply to Detect Trojans And Backdoors |
title_full |
Analysing The Protocol of Network Connection to Apply to Detect Trojans And Backdoors |
title_fullStr |
Analysing The Protocol of Network Connection to Apply to Detect Trojans And Backdoors |
title_full_unstemmed |
Analysing The Protocol of Network Connection to Apply to Detect Trojans And Backdoors |
title_sort |
analysing the protocol of network connection to apply to detect trojans and backdoors |
publishDate |
2006 |
url |
http://ndltd.ncl.edu.tw/handle/00019713901924498438 |
work_keys_str_mv |
AT jiatewang analysingtheprotocolofnetworkconnectiontoapplytodetecttrojansandbackdoors AT wāngjiādé analysingtheprotocolofnetworkconnectiontoapplytodetecttrojansandbackdoors AT jiatewang liánxiànxiédìngfēnxīyùnyòngyúzhēncèmùmǎhòuménzhīyánjiū AT wāngjiādé liánxiànxiédìngfēnxīyùnyòngyúzhēncèmùmǎhòuménzhīyánjiū |
_version_ |
1716840915461472256 |