下載電子全文宣告This thesis is authorized to indicate in-campus access only
You can not download at the moment.
Your IP address is 126.96.36.199
The defense date of the thesis is 2006-04-05
The current date is 2017-11-21
This thesis will be accessible at off-campus not accessible
URN etd-0405106-233217 Statistics This thesis had been viewed 1492 times. Download 15 times. Author Jia-te Wang Author's Email Address No Public. Department Computer Science and Enginerring Year 2005 Semester 1 Degree Master Type of Document Master's Thesis Language English Page Count 60 Title Analysing The Protocol of Network Connection to Apply to Detect Trojans And Backdoors Keyword Network protocol Back door Trojan horse Trojan horse Back door Network protocol Abstract It is important problems of the information safety at present that the computer is invaded and attacks on-linly, before damaging recovered even undiscovered ing, its damage arrow is unable to estimate in advance. And it cause the back door wide open to become and attack one of the means to steal with resources maliciously now that the Trojan horse is slipped into and caused, invador three two pass in and out fast and 2 methods that achieve the goal of monitoring and controlling too usually. A present one is it examine way rely mainly on the fact that the characteristic of the procedure is detected and examined mainly , to undiscovered with want the hidden procedure of back door of Trojan horse very much to detect, as virtue rises on foot vice rises ten all the time, this take place materials leakage and main reason that steal constantly too.
Page this through normal Client/Server procedure similar to back door the amount of result kind is it control execution of tool to carry far, compare the difference that its network communication protocol changes, when produce the back door after being invaded , what a communication , the change taking place through the protocol carried on between the persons who knows this procedure and control, detect and measure the possibility planted into the back door .
Advisor Committee Jin-cheng Lin - advisor
none - co-chair
none - co-chair
Files Date of Defense 2006-01-16 Date of Submission 2006-04-05