您好,欢迎访问三七文档
分类号:TP393.08UDC:D10621-408-(2007)5864-0密级:公开编号:2003031311成都信息工程学院学位论文木马检测工具的实现论文作者姓名:魏云柯申请学位专业:计算机科学与技术申请学位类别:工学学士指导教师姓名(职称):熊淑华(副教授)论文提交日期:2007年6月9日木马检测工具的实现摘要近年来,“特洛伊木马”(以下简称木马)数量迅速增加,在各类非法程序中已经占到了极大的比重,由木马所造成的破坏和损失也越来越严重,因此,反木马的研究己成为网络安全领域的一个热点和重点。基于特征码的静态扫描技术由于具有检测潜伏的木马、病毒等非法程序的能力,成为反木马、反病毒等研究领域的一个热点,所以至今特征码技术得到了广泛的应用。特征代码法,是目前公认的检测己知病毒的最简单、开销最小的方法。检测工具在将已知木马以二进制读取到的4096位字符串,通过MD5取摘要作为特征码,然后将这些木马独有的特征搜集在一个木马特征码数据库中。每当需要确定文件是否为木马的时候,检测工具会以扫描的方式将数据文件与特征码数据库内的现有特征码一一比对,如果双方数据吻合,就可以判定该数据文件为木马文件。本工具检测准确,可识别病毒的名称,依据检测结果,可做相应的处理。关键词:网络安全;木马;MD5;特征码TheImplementationofaTrojanDetectionToolAbstractInrecentyears,thenumberoftrojanisincreasingveryrapidanditnowamountstothemostpartamonginalltheillegalprograms.Trojanshavebroughtmuchmoreseriousdamagesandlosses.Asaresult,theresearchofanti-trojanhasalreadybecomethehotspotandthemainemphasisintheareaofnetworksecurity.Becauseofitsabilityofdetectingunknowntrojans,signature-basedscanninghascurrentlyturnedintohotspotintheanti-trojanresearcharea.Sothecharacteristiccodetechnologyisusedwidely.ThecharacteristiccodetechnologyisthemethodthathasthesimplestandlowestexpensetochecktheTrojans.Thetoolgets4,096bitsfromtheknownTrojansfile,andgetsitsmessagedigestwithMD5algorithm,thenputsthisvalueinanINIfileasthedatabaseofTrojancharacteristiccode.Whenafileischecked,thetoolwillscanthefileandcomparewiththecharacteristiccodedatabase,ifthemessagedigestofthisfileisequaltoacertainrecord,thenwecandeterminethefileisaTrojanfile.Theaccuracyofourtoolisveryhigh,andcanidentifythenameoftheTrojan.Accordingtotheresult,itcantakecorrespondingmeasuretodealwiththeTrojanfile.Keywords:Networksecurity;Trojan;MD5;Characteristiccode目录论文总页数:26页1引言.........................................................................................................................................11.1木马查杀工具设计背景...................................................................................................11.1.1木马的概念及技术原理...........................................................................................11.1.2木马的危害...............................................................................................................31.2现在流行的查杀方式.......................................................................................................31.3木马检测的实现方法.......................................................................................................61.3.1PE文件静态信息的提取和特征码的设置.............................................................61.3.2特征码选择与采集...................................................................................................81.3.3特征码库的设计.......................................................................................................81.3.4信息摘要技术中的MD5算法................................................................................91.3.5MD5算法的原理及应用.......................................................................................101.3.6MD5作特征码简介...............................................................................................112需求分析及方案设计.............................................................................................................112.1本工具要完成的功能.....................................................................................................112.2环境需求.........................................................................................................................112.3可行性研究.....................................................................................................................113木马查杀功能的实现.............................................................................................................123.1工具模块介绍.................................................................................................................123.2木马特征码的读取.........................................................................................................123.3获得文件MD5特征码..................................................................................................143.4文件属性的更改.............................................................................................................193.5实现驱动器的选择.........................................................................................................193.6MD5特征码查杀...........................................................................................................22结论.........................................................................................................................................23参考文献.........................................................................................................................................24致谢.........................................................................................................................................25声明.........................................................................................................................................26第1页共26页1引言1.1木马查杀工具设计背景“特洛伊木马”这个词源于希腊古神话中的一场战役,而今天计算机的应用领域中,木马的存在给网络安全带来了不容忽视的问题。计算机网络发展到今天,已经迅速延伸到世界的每
本文标题:木马检测工具的实现
链接地址:https://www.777doc.com/doc-3524038 .html