Dissertation > Excellent graduate degree dissertation topics show

Worms automatic writing machine and network attacks

Author: WenJingJing
Tutor: WangWenGuo
School: Qufu Normal University
Course: Applied Computer Technology
Keywords: Network Attack Internet Worm Self-compiling Internet Worm Distributed Multi-agent Architecture
CLC: TP309.5
Type: Master's thesis
Year: 2006
Downloads: 225
Quote: 0
Read: Download Dissertation

Abstract


Along with the rapid development of information technology, we are now stepping into an information society. The development of national economy depends more and more on information resource and technology. At the same time, information war has become one of the major forms of modern war. The Internet, nowadays being very useful in our daily life, can also be used as a major battlefield in modern war.In this paper we will first introduce the background and history of network attack, including the conception, technology, and trend of future development. Then we will discuss the relationship between network attack and counter-attack. Following we will give the definition of Internet worm, its classification, the difference and similarity between Internet worm and Internet virus, as well as the problems related to Internet worm research.In this paper, for the first time, we will systematically study the concept and methods of Self-compiling Internet Worm. Following its definition, we will discuss in detail its intelligence and feasibility in modern info war. In particular, we will introduce the multi-agent technology in the information collection and storage process of Self-compiling Internet Worms. We will study its architecture, system modules and functionality, system implementation, communication mechanism, system security and so on. The paper finishes with a summary of our research work, existing problems and future jobs to do.

Related Dissertations

  1. The Design of a Detection and Warning System for Internet Worm Based on the Characteristics of the Network,TP393.08
  2. Worm Modeling and Defense Strategies for Large-Scale Networks,TP393.08
  3. Network Worm Prevention Mechanism Research Based on P2P Technology,TP393.08
  4. Study on Propagation and Control of Internet Worms,TP393.08
  5. The Research on Detecting Network Attack and Discovering Attack-Character Based on Frequent Pattern Mining,TP393.08
  6. Research, Design and Implementation of Warning System for Network Attack,TP393.08
  7. Research on the Integration Technology of Attack Tools Based on Extended NASL Script,TP393.08
  8. The Research of Anomaly Intrusion Detection System Based on Campus Network,TP393.18
  9. Design and Implementation of Windows Kernel-mode Cryptographic Service Interface,TP309.7
  10. The Design and Implementation of Security Mechanism of Embedded Dependable Computer,TP309
  11. Research on Iris Based Cryptography,TP309.7
  12. The Research of Dynamic Trust Model on Cloud Computing Platform,TP309
  13. Research of Sensitive Information Protection Techniques for Automated Trust Negotiation,TP309
  14. Study on the Access Control of the Court Information System,TP309
  15. Modeling and Storing the Uncertain Data in the k-anonymity Privacy Protection Model,TP309
  16. Research and Design of Secure Comunication of NVD on Demand System,TP309
  17. Astudy on Key Problems in Redundancy Standby Technology with High Reliability for Broadband Remote Access Server,TP309.3
  18. A Static Behavior-Based Method to Detect Malware on Android,TP309
  19. Optical Image Encryption Algorithms Based on Fractional Mellin Transform,TP309.7
  20. Safety -oriented cloud computing terminal key technologies,TP309
  21. Study on Image Authentication Model Based on Chaos Theory and Cryptography,TP309
  22. Research on Monitoring and Tracing Secret Documents of Mobile Storage Devices,TP309.2

CLC: > Industrial Technology > Automation technology,computer technology > Computing technology,computer technology > General issues > Security and confidentiality > Computer viruses and prevention
© 2012 www.DissertationTopic.Net  Mobile