期刊文献+

高校网页木马病毒的防范思路和方法 预览 被引量:1

Ideas and Methods of University Webpage Trojan Virus Prevention
在线阅读 下载PDF
收藏 分享 导出
摘要 网页木马病毒是一段基于JavaScript、VBScript、CSS等脚本的恶意代码,通过用户在客户端的访问实现隐秘运行,从而达到木马传播、破坏的目的。根据网页木马传播特点,运行方式及表现形式,并结合实际经验分3个层面介绍了网页木马的特点和攻击模式;给高校信息化工作造成的危害以及如何检测,如何查杀和防范网页木马的威胁。对于高校网站提高安全防护水平和加强网页木马病毒的防范有较强的实用价值和借鉴意义。 Webpage Trojan virus is a malicious code based on scripts such as JavaScript, VBScript and CSS. It runs covertly by the client access of users so that it can achieve the purpose of Trojan virus spread and destruction. According to the characteristics of Webpage Trojan spread, operation mode and form of expression, this paper introduces the characteristics and attack pattern of Webpage Trojan, the harm to the university informationization and how to scan, destroy and protect against the Trojan virus combined with practical experience in three aspects. It has strong practical value and reference to the improvement of University website safety and Webpage Troj an virus prevention.
作者 任祎 Ren yi (Shaanxi Xueqian Normal University, Xi'an 710100, China)
出处 《微型电脑应用》 2015年第4期62-64,共3页 Microcomputer Applications
关键词 网页木马 漏洞 木马查杀 防范措施 Webpage Trojan Loophole Trojan Avira Preventive Measures
  • 相关文献

参考文献6

二级参考文献93

  • 1安晓瑞.ASP网站网页挂马的危害分析及防范对策研究[J].兰州文理学院学报:自然科学版,2013(4):74-78. 被引量:1
  • 2张慧琳,诸葛建伟,宋程昱,韩心慧,邹维,.基于网页动态视图的网页木马检测方法[J].清华大学学报:自然科学版,2009,0(S2):2126-2132. 被引量:8
  • 3Zhuge JW, Holz T, Song CY, Guo JP, Han XH, Zou W. Studying malicious websites and the underground economy on the Chinese Web. In: Johnson ME, ed. Proc. of the Managing Information Risk and the Economics of Security. Berlin, Heidelberg: Springer-Verlag, 2009. 225-244. [doi: 10.1007/978-0-387-09762-6_11]. 被引量:1
  • 4Caballero J, Grier C, Kreibich C, Paxson V. Measuring pay-per-install: The commoditization of malware distribution. In: Proc. of the 20th USENIX Security Symp. Berkeley: USENIX Association, 2011. http://dl.acm.org/citation.cfm?id=2028067.2028080. 被引量:1
  • 5Polychronakis M, Mavrommatis P, Provos N. Ghost turns zombie: Exploring the life cycle of Web-based malware. In: Proc. of the 1st USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET). Berkeley: USENIX Association, 2008. http://dl. acm.org/citation.cfm?id= 1387709.1387720. 被引量:1
  • 6Wikipedia. Drive-By download. 2005. http://en.wikipedia.org/wiki/Drive-by download. 被引量:1
  • 7Provos N, Mavrommatis P, Rajab MA, Monrose F. All your iFRAMEs point to us. In: Proc. of the 17th USENIX Security Symp. Berkele: USENIX Association, 2008. 1-15. http://dl.acm.org/citation.cfm?id= 1496711.1496712. 被引量:1
  • 8Cova M, Kruegel C, Vigna G. Detection and analysis of drive-by-download attacks and malicious JavaScript code. In: Proc. of the 19th Int'l Conf. on World Wide Web (WWW). New York: ACM Press, 2010.281-290. [doi: 10.1145/1772690.1772720]. 被引量:1
  • 9Nazario J. PhoneyC: A virtual client honeypot. In: Proc. of the 2nd USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET). Berkeley: USENIX Association, 2009. http://dl.acm.org/citation.cfm?id=1855676.1855682. 被引量:1
  • 10Egele M, Kirda E, Kruegel C. Mitigating drive-by download attacks: Challenges and open problems. In: Camenisch J, Kesdogan D, eds. Proc. of Open Research Problems in Network Security Workshop (iNetSee)llFIP Advances in Information and Communication Technology. Berlin, Heidelberg: Springer-Verlag, 2009. 52-62. [doi: 10.1007/978-3-642-05437-2_5]. 被引量:1

共引文献34

同被引文献13

引证文献1

投稿分析
职称考试

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部 意见反馈