Analysing The Protocol of Network Connection to Apply to Detect Trojans And Backdoors

碩士 === 大同大學 === 資訊工程學系(所) === 94 === It is important problems of the information safety at present that the computer is invaded and attacks on-linly, before damaging recovered even undiscovered ing, its damage arrow is unable to estimate in advance. And it cause the back door wide open to become and...

Full description

Bibliographic Details
Main Authors: Jia-te Wang, 汪佳德
Other Authors: Jin-cheng Lin
Format: Others
Language:en_US
Published: 2006
Online Access:http://ndltd.ncl.edu.tw/handle/00019713901924498438
id ndltd-TW-094TTU01392001
record_format oai_dc
spelling ndltd-TW-094TTU013920012015-10-13T11:15:49Z http://ndltd.ncl.edu.tw/handle/00019713901924498438 Analysing The Protocol of Network Connection to Apply to Detect Trojans And Backdoors 連線協定分析運用於偵測木馬後門之研究 Jia-te Wang 汪佳德 碩士 大同大學 資訊工程學系(所) 94 It is important problems of the information safety at present that the computer is invaded and attacks on-linly, before damaging recovered even undiscovered ing, its damage arrow is unable to estimate in advance. And it cause the back door wide open to become and attack one of the means to steal with resources maliciously now that the Trojan horse is slipped into and caused, invador three two pass in and out fast and 2 methods that achieve the goal of monitoring and controlling too usually. A present one is it examine way rely mainly on the fact that the characteristic of the procedure is detected and examined mainly , to undiscovered with want the hidden procedure of back door of Trojan horse very much to detect, as virtue rises on foot vice rises ten all the time, this take place materials leakage and main reason that steal constantly too. Page this through normal Client/Server procedure similar to back door the amount of result kind is it control execution of tool to carry far, compare the difference that its network communication protocol changes, when produce the back door after being invaded , what a communication , the change taking place through the protocol carried on between the persons who knows this procedure and control, detect and measure the possibility planted into the back door . Jin-cheng Lin 林金城 2006 學位論文 ; thesis 60 en_US
collection NDLTD
language en_US
format Others
sources NDLTD
description 碩士 === 大同大學 === 資訊工程學系(所) === 94 === It is important problems of the information safety at present that the computer is invaded and attacks on-linly, before damaging recovered even undiscovered ing, its damage arrow is unable to estimate in advance. And it cause the back door wide open to become and attack one of the means to steal with resources maliciously now that the Trojan horse is slipped into and caused, invador three two pass in and out fast and 2 methods that achieve the goal of monitoring and controlling too usually. A present one is it examine way rely mainly on the fact that the characteristic of the procedure is detected and examined mainly , to undiscovered with want the hidden procedure of back door of Trojan horse very much to detect, as virtue rises on foot vice rises ten all the time, this take place materials leakage and main reason that steal constantly too. Page this through normal Client/Server procedure similar to back door the amount of result kind is it control execution of tool to carry far, compare the difference that its network communication protocol changes, when produce the back door after being invaded , what a communication , the change taking place through the protocol carried on between the persons who knows this procedure and control, detect and measure the possibility planted into the back door .
author2 Jin-cheng Lin
author_facet Jin-cheng Lin
Jia-te Wang
汪佳德
author Jia-te Wang
汪佳德
spellingShingle Jia-te Wang
汪佳德
Analysing The Protocol of Network Connection to Apply to Detect Trojans And Backdoors
author_sort Jia-te Wang
title Analysing The Protocol of Network Connection to Apply to Detect Trojans And Backdoors
title_short Analysing The Protocol of Network Connection to Apply to Detect Trojans And Backdoors
title_full Analysing The Protocol of Network Connection to Apply to Detect Trojans And Backdoors
title_fullStr Analysing The Protocol of Network Connection to Apply to Detect Trojans And Backdoors
title_full_unstemmed Analysing The Protocol of Network Connection to Apply to Detect Trojans And Backdoors
title_sort analysing the protocol of network connection to apply to detect trojans and backdoors
publishDate 2006
url http://ndltd.ncl.edu.tw/handle/00019713901924498438
work_keys_str_mv AT jiatewang analysingtheprotocolofnetworkconnectiontoapplytodetecttrojansandbackdoors
AT wāngjiādé analysingtheprotocolofnetworkconnectiontoapplytodetecttrojansandbackdoors
AT jiatewang liánxiànxiédìngfēnxīyùnyòngyúzhēncèmùmǎhòuménzhīyánjiū
AT wāngjiādé liánxiànxiédìngfēnxīyùnyòngyúzhēncèmùmǎhòuménzhīyánjiū
_version_ 1716840915461472256