Font Size: a A A

The Research, Based Trojan Network Attack Techniques

Posted on:2005-07-10Degree:MasterType:Thesis
Country:ChinaCandidate:C G LiuFull Text:PDF
GTID:2208360122981823Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With the rapid development of information technology, We have been stepping into the Information Era , and information has been our precious resource , Especially , Internet has been into all of fields of our society , Our decisions have been depending the information more and more Thus the information has been becoming one of our resource strategically The Information War will become one of crucial forms of war in future , which use the world wide network as the primary battlefield Thus how to achieve the important information of our enemy becomes one of crucial factors that determine the war in future In respect of military , we should be scout with the network in the peacetime to achieve the economic , military information of the enemy ; In the wartime , we should destroy the system of enemy , and cause a paralysis of network The Trojan Horse can aim at this The thesis focus on the key technology involved in Trojan Horse And the mainly work completed as follows:(1) Research on network & information antagonism technologies, especially network attack technologies.(2) Do an in-depth research on network attack technology based Trojan Horse.(3) Have implemented a Trojan Horse system, named SAKER which introduces advanced hiding technique, spreading technique and safe communicating technique.( 4 ) Have tested the primary function of the sytem , and experimentation have proved that the system worked in order and the implementation &design of the system was feasible.
Keywords/Search Tags:Network & Information Antagonism Technologies, Network Attack Technologies, Trojan Horse, Process Hiding, Covert Communication
PDF Full Text Request
Related items