| With the high-speed development of computer science and extensive application of the network, information become the valuable resource of the world. Military informationlize is a deep revolution. Internet war become the new battle mode and the network attacking technique will be the indispensable weapon of Internet war. It makes far-reaching sense for the information war and Internet war to research on the ulterior monitoring technique in the future.Aimed at the design requirement of a efficient ulterior monitoring system, base on the research of functionality and pivotal technique of the configurable multiple communication mode, a ulterior monitoring system of remote user behaviors is designed. Work flow of the system is described and detailed design of pivotal functional modules is completed.Aimed at the concealment issue of self start-up module, a new start-up method which using Windows service is given, and the concealment capability is optimized. To improve the process concealment capability, a backup and restore technique of memory image is proposed, so it makes the monitoring system exists not as a DLL(Dynamic Link Library) file but as a memory module. To adapt to different network bandwidth environment and make the system more flexible, the configurable management of network transmission module is implemented.It is shown by the test results that the ulterior monitoring of remote user behaviors can get the remote user information efficiently and control the aimed user at the same time, the remote user is difficult to find out the monitoring system. |