首頁 > 網路資源 > 大同大學數位論文系統

Title page for etd-0405106-233217


URN etd-0405106-233217 Statistics This thesis had been viewed 1492 times. Download 15 times.
Author Jia-te Wang
Author's Email Address No Public.
Department Computer Science and Enginerring
Year 2005 Semester 1
Degree Master Type of Document Master's Thesis
Language English Page Count 60
Title Analysing The Protocol of Network Connection to Apply to Detect Trojans And Backdoors
Keyword
  • Network protocol
  • Back door
  • Trojan horse
  • Trojan horse
  • Back door
  • Network protocol
  • Abstract It is important problems of the information safety at present that the computer is invaded and attacks on-linly, before damaging recovered even undiscovered ing, its damage arrow is unable to estimate in advance. And it cause the back door wide open to become and attack one of the means to steal with resources maliciously now that the Trojan horse is slipped into and caused, invador three two pass in and out fast and 2 methods that achieve the goal of monitoring and controlling too usually. A present one is it examine way rely mainly on the fact that the characteristic of the procedure is detected and examined mainly , to undiscovered with want the hidden procedure of back door of Trojan horse very much to detect, as virtue rises on foot vice rises ten all the time, this take place materials leakage and main reason that steal constantly too.
    Page this through normal Client/Server procedure similar to back door the amount of result kind is it control execution of tool to carry far, compare the difference that its network communication protocol changes, when produce the back door after being invaded , what a communication , the change taking place through the protocol carried on between the persons who knows this procedure and control, detect and measure the possibility planted into the back door .
    Advisor Committee
  • Jin-cheng Lin - advisor
  • none - co-chair
  • none - co-chair
  • Files indicate in-campus access only
    Date of Defense 2006-01-16 Date of Submission 2006-04-05


    Browse | Search All Available ETDs