Dissertation > Excellent graduate degree dissertation topics show

Research on Propagation and Defense Technology Against Malicious Code

Author: WangXiaoYong
Tutor: QiuYuHui
School: Southwestern University
Course: Applied Computer Technology
Keywords: malicious code computer virus Internet worm Trojan horse enterprise network
CLC: TP309.5
Type: Master's thesis
Year: 2007
Downloads: 529
Quote: 7
Read: Download Dissertation

Abstract


Popularity of the Internet, complexity of applications and demand for information sharing those give advantages to the propagation of malicious code. So all kinds of new malicious code emerge incessantly, and their propagation becomes faster. The threat of malicious code to information security becomes increasingly serious. Therefore, the key issues of prevention againstmalicious code-propagation and defense techniques are studied mainly in this thesis, and thena defense system against malicious code for enterprise network is proposed.The following principal achievements have been obtained:First, The definition of malicious code, its basic knowledge and its main characteristics are introduced. Then classification to malicious code is carried on that makes the preparation for the following research.Second, the propagation mechanism of malicious codes, which include computer viruses, worms and Trojan horses, is analyzed minutely. Their propagation ways, propagation methods and main key techniques are also analyzed.Third, the main defense techniques against malicious code, including implements host-based, network-based prevention and benign worm, are studied and comparatively analyzed.Fourth, a defense system against malicious code for enterprise network is proposed, based on analyzing and comparing advantages and disadvantages of the current defense methods against malicious code. The system design goal, the overall structure, the realization method in detail and the key techniques are introduced. This defense system makes good use of the positive qualities of the man, technology and policy. Moreover, this defense system integrates various prevention techniques, such as patching system holes, network detection, firewall technology, isolation technology, detecting behavior characteristic of malicious code, integrity technology, technical guidance and so on.

Related Dissertations

  1. The Research and Realization of Unwanted Code Monitoring System Based on Heuristic Algorithm,TP393.08
  2. File-based parsing file infection method,TP391.1
  3. Computer virus detection method,TP309.5
  4. IPsec-based remote access to corporate network systems design and implementation,TP393.08
  5. Content-based malicious code detection Research and Implementation,TP393.092
  6. Global Value Chain Strategic Enterprise Network Paradigm,F272
  7. A Study on the Relationship of Enterprise Network, Knowledge Inflow and Management Innovation,F224
  8. The Management and Control of Computer Virus Response Project Oriented,TP309.5
  9. Model and empirical research based on the perspective of internal and external corporate network innovation performance factors affect,F224
  10. Research and Implementation of Computer Remote Control Based on Trojan Horse Technology,TP273
  11. Research on Activator Particle Monitor System Online Based on Enterprise Network,TP274.4
  12. Research on Network Communication Signature Generation Technology of Trojan Horses,TP393.08
  13. Research on Virtualization-based Capture Technology of Malicious Code Behavior,TP393.08
  14. The Design and Implementation of Enterprise Transmission Network Based on the RPR Technology,TP393.1
  15. Research on Malicious Code Detection Technology for E-mail System,TP393.08
  16. Research on the Application of File System Filter Driver in Anti-malicious Code,TP393.08
  17. Research on Key Technologies for Malicious-degree Decision of Program Behaviors Based on Dynamic Fuzzy Neural Network,TP309
  18. The empirical research of the performance of the enterprise network structure characteristics of the enterprise internationalization,F224
  19. Detection and Behavior Analysis of Malicious Code,TP393.08
  20. Research into the Detection and Classification of Malware,TP393.08
  21. Design and implementation of online training system based on ASP technology,TP311.52

CLC: > Industrial Technology > Automation technology,computer technology > Computing technology,computer technology > General issues > Security and confidentiality > Computer viruses and prevention
© 2012 www.DissertationTopic.Net  Mobile