池州学院本科毕业设计(论文) 题目: 木马病毒分析学生姓名: 潮磊学号: 110315101 系(部): 数学与计算机科学系专业: 计算机科学技术入学时间: 2011 年 6月导师姓名: 彭秀芬职称/ 学位: 讲师/ 硕士导师所在单位: 池州学院毕业设计(论文)提交时间:二 O一三年五月木马病毒分析摘要随着计算机网络技术的高速发展, 已伸向了世界的每一个角落,正在对人们的生活方式和工作方式产生着前所未有的影响。互联网在给人民群众的生活带来便利的同时, 也给犯罪分子利用计算机网络从事犯罪活动提供了便利。今天, 利用计算机网络实施的智能犯罪日益猖撅, 对社会造成的危害也越来越大, 网络犯罪的发展对新时期信息时代的安全工作提出了新的挑战。在某些特定的时间、地点, 公安民警通过诸如木马程序对利用互联网实施犯罪、逃避打击的犯罪嫌疑人的目标计算机进行远程监控, 掌握犯罪嫌疑人的活动情况及犯罪证据, 从而更好的打击犯罪, 维护国家安全和保障人民群众安居乐业, 这就是本文研究的出发点。本论文对目前较为流行的木马技术的实现方式、工作原理及远程控制的关键技术进行系统的研究,重点对木马程序的进程实现、受控端与控制端通信进行剖析。在研究 Window s 平台下特洛伊木马关键技术的基础上, 给出一种木马对远程计算机进行有效实时监控的系统设计与实现。关键词:木马技术;木马危害;远程控制 Trojan horse analysis Abstract With the rapidly growing work technology , the reach of Inte rn et has extended to er in the world , and it has all unprecedented influence on people ’s life styles and the work ways . The gives the public convenience ; meanwhile , it provides criminals chances to engage in criminal activities through using work . Today , the intelligent crimes , by means of work e frantic day by day , which caused more and more harms to the society , so the increase work crimes proposed new challenges work security in the information age . Ina certain time and place , police should carry out remote control on suspect ’s puter through which the mit crimes via the inte rn et and get rid of attacks . They should master the suspect ’s activities and crime evidence in order to crack down on crimes to protect the nation and people ’s security . All of these are the starting point of this essay . This essay takes research on realizing ways of popular Tro jan horse technology , the principle of working and the remote-control system controlling technology . The important aspects lie in the explanation of Trojan ’s process realizing , munication between controlling port and controlled port . This essay is under the platform of Window studies , on the basis of the Trojan essential technological foundation , produces one kind of system design and realization of an effective real-tim
潮磊池州学院毕业论文终稿研讨 来自淘豆网www.taodocs.com转载请标明出处.