期刊文献+

网页木马机理与防御方法研究 预览

在线阅读 下载PDF
收藏 分享 导出
摘要 随着现代计算机网络的不断普及,网络安全问题越来越受到社会各界的重视。网页木马具有强大的远程控制作用,给用户的网络安全带来了巨大的隐患。本研究就网页木马的机理和和特点入手,对如何进行木马的防御进行简要的探讨,以提高网络应用的安全。
作者 曾泽军
出处 《电子技术与软件工程》 2016年第6期220-220,共1页 ELECTRONIC TECHNOLOGY & SOFTWARE ENGINEERING
  • 相关文献

参考文献2

二级参考文献65

  • 1张慧琳,诸葛建伟,宋程昱,韩心慧,邹维,.基于网页动态视图的网页木马检测方法[J].清华大学学报:自然科学版,2009,0(S2):2126-2132. 被引量:8
  • 2Zhuge JW, Holz T, Song CY, Guo JP, Han XH, Zou W. Studying malicious websites and the underground economy on the Chinese Web. In: Johnson ME, ed. Proc. of the Managing Information Risk and the Economics of Security. Berlin, Heidelberg: Springer-Verlag, 2009. 225-244. [doi: 10.1007/978-0-387-09762-6_11]. 被引量:1
  • 3Caballero J, Grier C, Kreibich C, Paxson V. Measuring pay-per-install: The commoditization of malware distribution. In: Proc. of the 20th USENIX Security Symp. Berkeley: USENIX Association, 2011. http://dl.acm.org/citation.cfm?id=2028067.2028080. 被引量:1
  • 4Polychronakis M, Mavrommatis P, Provos N. Ghost turns zombie: Exploring the life cycle of Web-based malware. In: Proc. of the 1st USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET). Berkeley: USENIX Association, 2008. http://dl. acm.org/citation.cfm?id= 1387709.1387720. 被引量:1
  • 5Wikipedia. Drive-By download. 2005. http://en.wikipedia.org/wiki/Drive-by download. 被引量:1
  • 6Provos N, Mavrommatis P, Rajab MA, Monrose F. All your iFRAMEs point to us. In: Proc. of the 17th USENIX Security Symp. Berkele: USENIX Association, 2008. 1-15. http://dl.acm.org/citation.cfm?id= 1496711.1496712. 被引量:1
  • 7Cova M, Kruegel C, Vigna G. Detection and analysis of drive-by-download attacks and malicious JavaScript code. In: Proc. of the 19th Int'l Conf. on World Wide Web (WWW). New York: ACM Press, 2010.281-290. [doi: 10.1145/1772690.1772720]. 被引量:1
  • 8Nazario J. PhoneyC: A virtual client honeypot. In: Proc. of the 2nd USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET). Berkeley: USENIX Association, 2009. http://dl.acm.org/citation.cfm?id=1855676.1855682. 被引量:1
  • 9Egele M, Kirda E, Kruegel C. Mitigating drive-by download attacks: Challenges and open problems. In: Camenisch J, Kesdogan D, eds. Proc. of Open Research Problems in Network Security Workshop (iNetSee)llFIP Advances in Information and Communication Technology. Berlin, Heidelberg: Springer-Verlag, 2009. 52-62. [doi: 10.1007/978-3-642-05437-2_5]. 被引量:1
  • 10The MITRE Corporation. CVE-2008-6442.2009. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-6442. 被引量:1

共引文献27

投稿分析
职称考试

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部 意见反馈