木马技术研究及反弹木马系统的设计与实现
[Abstract]:In the 21 ~ (th) century, network life gradually became the theme of people's daily life. At the same time, we should also see that the network brings a lot of convenience to the people of our country, but also brings many problems of information security. Among them, Trojan horse is one of the important hidden dangers that threaten current network information security. Trojans attack computer system vulnerabilities, steal critical information from individuals and enterprise users, and may destroy network resources. Nowadays, with the continuous development of network technology and the upgrading of Trojan horse technology, it has brought great influence and harm to people's production and life. Therefore, it is of great significance to strengthen the research of Trojan horse technology and how to improve the related detection and defense technology to quickly discover Trojan horse, predict and predict Trojan horse, and actively deal with Trojan horse. Firstly, the paper systematically studies, analyzes, summarizes and sums up the key technologies used in Trojan horse program, including its working principle, realization mode and current popular Trojan horse technology. Secondly, on the basis of decomposing the key technologies, based on the workflow of Trojan horse, the Trojan horse behavior is divided into four main processes: implantation stage, hidden stage, communication stage and startup stage. And the emphasis on each stage of the use of technology for serious analysis. At the same time, the development trend of modern Trojan horse to make a reasonable prediction. Finally, combining with the popular remote thread injection technology and rebound port technology, this paper presents the design and implementation of a rebound port Trojan horse system. Among them, Trojan horse server uses remote thread injection technology to achieve hidden purpose, and uses associated file to start with text file. Based on the TCP/IP protocol system, the rebound port Trojan system establishes the communication, obtains the connection information by reading and writing the online FTP server files, and realizes the connection function of the rebound port. The client adopts the interface management method to realize the CMD command control of the server. The system is designed and developed on the basis of windows operating platform, which can be hidden and implanted in controlled computer, realize the process free startup and active connection of controlled end, which truly reflects the working principle of rebound port Trojan horse. To provide a certain reference for the study of the same kind of Trojan horse.
【学位授予单位】:云南大学
【学位级别】:硕士
【学位授予年份】:2014
【分类号】:TP393.08
【共引文献】
相关期刊论文 前10条
1 刘晋辉;;计算机病毒技术分析[J];兵工自动化;2012年01期
2 周亚萍;;U盘病毒的分析及研究[J];才智;2009年20期
3 高凯鹏;周伟;;网络信息系统的安全问题及对策[J];吉林大学学报(地球科学版);2008年S1期
4 董照刚;;浅析校园网病毒的防治[J];成才之路;2009年33期
5 敬锐;甘刚;;Win32平台下PE病毒研究、实现及防范[J];成都信息工程学院学报;2007年S1期
6 杨辉军;;一个改进的蠕虫传播模型研究[J];长江大学学报(自然科学版)理工卷;2009年04期
7 张瑜;李涛;吴丽华;彭小宁;覃仁超;;计算机病毒演化模型及分析[J];电子科技大学学报;2009年03期
8 赵相和;王隽;刘跃;;电厂局域网计算机病毒防治措施[J];电力系统通信;2008年10期
9 杨明明;孔靓;;计算机病毒及防范措施简介[J];电脑学习;2010年01期
10 赵长军;李梓;;计算机病毒的危害与防护[J];电脑学习;2010年06期
相关博士学位论文 前1条
1 任建国;计算机病毒的网络传播机制:三个新型的动力系统模型[D];重庆大学;2012年
相关硕士学位论文 前10条
1 贾晋峰;山西农村网络文化站IT管理平台的分析与设计[D];北京邮电大学;2011年
2 赵丽娟;Fuzz安全测试技术研究[D];北京邮电大学;2011年
3 王松;基于学习的恶意网页智能检测系统[D];南京理工大学;2011年
4 莫樱;基于病毒行为分析的特征码的提取与检测[D];电子科技大学;2011年
5 任广明;盗号木马攻击与防范技术的研究实施[D];山东大学;2011年
6 杨坤;数据挖掘方法的即时通讯工具病毒检测研究[D];长春理工大学;2011年
7 蒋晓峰;面向开源程序的特征码免杀与主动防御突破研究[D];上海交通大学;2011年
8 岳峰;基于动态模糊神经网络的程序行为恶意性判定关键技术研究[D];解放军信息工程大学;2010年
9 葛长涛;Win32 PE文件病毒行为分析与检测[D];解放军信息工程大学;2010年
10 王挺;一种信息战中的注入式可执行文件攻击技术的研究[D];华中科技大学;2010年
,本文编号:2189598
本文链接:https://www.wllwen.com/guanlilunwen/ydhl/2189598.html