期刊文献+

一种实用的反木马策略

A Practical Strategy for Anti-Trojan Detection
下载PDF
导出
摘要 在分析目前反木马病毒存在问题的基础上,给出了几种手工防范措施:查看启动项和文件系统、利用DoS命令、关联服务和进程等。该方法具有较强的实用性。 Basing on analysising the problems of anti_Trojan Horse,puts forword some practicable measures by hand:detecting startup items and file systems、using DoS commands、associating service and process.
作者 张瑞霞
出处 《计算机安全》 2009年第9期95-97,共3页 Network & Computer Security
关键词 木马病毒 手工检测 实用性 Trojan Horse virus detection by hand practicability
  • 相关文献

参考文献4

二级参考文献19

  • 1张新宇,卿斯汉,马恒太,张楠,孙淑华,蒋建春.特洛伊木马隐藏技术研究[J].通信学报,2004,25(7):153-159. 被引量:43
  • 2JonesA 京京工作室译.Windows网络编程技术[M].北京:机械工业出版社,2000.. 被引量:15
  • 3RichterJ 王建华译.Windows核心编程[M].北京:机械工业出版社,2000.. 被引量:15
  • 4Beyah R A, Holloway M C, Copeland J A. Invisible Trojan: An Architecture, Implementation and Detection Method[C]. In: The 2002 45^th Midwest Symposium on Circuits and Systems, 2002-08. 被引量:1
  • 5Debbabi M, Girard M, Poulin L, et al. Dynamic Monitoring of Malicious Activity in Software[C]. In: Symposium on Requirements Engineering for Information Security, Indianapolis, Indiana, USA,2001-03. 被引量:1
  • 6Cunningham R K, Lippmann R P, Webster S E. Detecting and Displaying Novel Computer Attacks with macroscope Systems[J].IEEE Transactions on Man and Cybernetics, 2001,3(4):275-285. 被引量:1
  • 7Proctor N, Wong R.The Security Policy of the Secure Distributed Operating System Prototype[C]. In: Computer Security Applications Conference, Fifth Annual, 1989:95 - 102. 被引量:1
  • 8Bergeron J, Debbabi M, Desharnais J. Static Detection of Malicious Code in Executable Programs[C]. In: Symposium on Requirements Engineering for Information Security, Indianapolis, Indiana, USA,Springer Verlag, 2001-03. 被引量:1
  • 9Salois M, Charpentier R. Dynamic Detection of Malicious Code in COTS Software[C]. In: Commercial Off-The-Shelf Products in Defence Applications "The Ruthless Pursuit of COTS",Neuilly-sur-Seine Cedex, France, NATO, RTO, 2000-04. 被引量:1
  • 10Weber M, Schmid M, Schatz M, et al. A Toolkit for Detecting and Analyzing Malicious Software[C]. Computer Security Applications Conference, Proceedings. 18^th Annual, 2002-12:423-431. 被引量:1

共引文献53

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部