Technology on Computer Remote Control and Hiding Method

Article Preview

Abstract:

This paper makes study on hiding technology and remote control technology of Trojan, gives design and realization of computer remote control system that can carry out monitoring on remote computer based on the main hiding method of Windows platform Trojan. This system can pass through firewall and unobtrusively implant into controlled computer as well as make real-time remote control on controlled computer according to command of control end.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

2540-2543

Citation:

Online since:

January 2015

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2015 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Chen Qianqian. Study and Realization on Trojan Detection System Based on Behavior Characteristic [D]. Sichuan Normal University. (2010).

Google Scholar

[2] Chen Xiaobing etc. Study on SQL Injected Attack and Prevent Detection Technology [J]. Computer Engineering and Application. 2007. 12: 116-119.

Google Scholar

[3] XiAO Bo. Initiative Safeguard Technology and Weakness Analysis Based on Behavior Analysis [J]. Computer Application and Software. 2009, 12(1): 17-19.

Google Scholar

[4] Pan Mian. New Plan on Trojan horse Injection Based on DLL Technology. Computer Engineering. 2004. 30 (18): 1-2.

Google Scholar

[5] Hu Wei. Design on Trojan Detection System Based on Dynamic Behavior [J]. Firepower and Command Control. 2010, 3: 23-25.

Google Scholar

[6] Jiang Jian. Trojan Block of Remote Access Based on Behavior Characteristic. Computer and Digital Engineering. 2008, 17: 119-121.

Google Scholar

[7] Cheng Weiwei. Study on Detection and Anti-detection of Virtual Machine. Network Safety Technology and Application. 2011, 18: 112-116.

Google Scholar

[8] Yang Sizhen Trojan Attack and Prevention Theory and Technology Study [D]. Shandong Normal University. (2011).

Google Scholar

[9] Xu Mingdi. Trust Link Test of Convinced Calculation Platform Based on Mark and Transition System [J]. Computer Journal. 2009, 12: 4-8.

Google Scholar