Implementation of Lightweight BHO Hijack Technology for Online Behavior Monitoring

Article Preview

Abstract:

With the increasingly wide range of Internet applications, Internet behavior monitoring aroused widespread concern. With BHO hijacking techniques to build an efficient monitoring system, not only can achieve real-time monitoring online behavior, but also has a lightweight characteristics, not only that, but also be able to effectively shield the site or filtered, to avoid unauthorized users from bad web , but also effectively prevent the illegal intrusion of the Web page. In the system design process, the application, the application of advanced signal report have both modular design strategy, so that the system has relatively broad applicability and can be private users, the user unit may be, in addition, the system In the communication efficiency is relatively good. In short, the Internet behavior of the monitoring system has won the people's widespread recognition.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

390-394

Citation:

Online since:

July 2014

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Feng Xue Ping, Zhi-Tang Li, Hao Tu, Baojin Xia. Malicious Web behavior detection method BHO technology [J]. Guangxi University (Natural Science Edition) . 2011 (S1) : 352-353 based.

Google Scholar

[2] Sang Qing Bing, WU Xiao-jun. site filtering system based on BHO [J]. Computer Engineering and Applications . 2009 (31) : 185-186.

Google Scholar

[3] Juan, Guo Chong, Wang Qiang Research [J] BHO network-based covert channel Computer Engineering . 2009 (05) : 198-199.

Google Scholar

[4] Geng Haitao. Discuss principles and methods of detection of computer network security vulnerabilities [J]. Valley . 2010 (23) : 29-31.

Google Scholar

[5] Hao Chen, Xu Research [J] information systems security framework based on virtualization technology. Power of information . 2011 (06) : 89-91.

Google Scholar

[6] Yang Zhigao, Gon Jianya. Applied research WebGIS technology combined with BHO mixed mode [J]. Central South Forestry University of Science and Technology . 2010 (12) : 105-106.

Google Scholar

[7] Gu Hongqi. Use technology to intercept IE BHO advertising window [J]. Science and Technology Information (Academic Research) . 2006 (12) : 205-206.

Google Scholar