Based on the Network Connection LAN Trojan Detection System Design and Implementation

Article Preview

Abstract:

In view of present LAN network security situation, analyzed the main methods to prevent Trojan and defects, we propose a network connection by monitoring and testing features found Trojan approach, and programming Web-based Trojan detection system connected to the LAN. System uses a modular design approach, the entire system is divided into Packet capture, Packet analysis, and Display, three modules can be run independently. Practice shows that this system is stable, fast, accurate analysis, and the use of high commercial value.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 468-471)

Pages:

514-518

Citation:

Online since:

February 2012

Keywords:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2012 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Tan Zhen. Campus network security management and prevention of hacking [J]. Beijing: Computer security.2007,10

Google Scholar

[2] Yi Fangchang. Web-based backdoor Trojan monitoring system research and design[D]. Beijing University of Chemical Technology. (2010)

Google Scholar

[3] Zhang Bin. Hackers and anti-hacker [M]. Beijing: Beijing University of Posts and Telecommunications Press,2004:114-146.

Google Scholar

[4] Shi Jing. Trojans and prevent inquiry [J]. Charming China,2009(14).

Google Scholar

[5] Li Junmin. Network Security and hackers attack and defense Collection [M]. Beijing: Electronic Industry Press,2011:293-335.

Google Scholar

[6] He Side, Shen Haoru. Computer Network Security and Applications [M]. Beijing:Science Press,2007:116-151.

Google Scholar

[7] Wang Yanlong. On the Trojans [J].Beijing: Education for Chinese After-school,2010( 11).

Google Scholar

[8] Cao Peng. 2009 the development computer virus prevention products of China[J].Beijing: China Information Security,2010(2).

Google Scholar

[9] Ed Skoudis,Tim Liston , Hackers attack and defense exercise[M]. Beijing: Electronic Industry Press,,2009.

Google Scholar

[10] Li Yan. The American network security progress track [J]. Beijing: China Information Security,2010(10).

Google Scholar