Dissertation > Excellent graduate degree dissertation topics show

Based on Bayesian theory Trojan Detection Technology

Author: LiZuo
Tutor: HanLanSheng
School: Huazhong University of Science and Technology
Course: Computer technology
Keywords: Trojan Static Code Features Dynamic behavior Bayesian classification Polynomial event model
CLC: TP393.092
Type: Master's thesis
Year: 2011
Downloads: 59
Quote: 0
Read: Download Dissertation

Abstract


With rapid development of Internet , computer applications have penetrated into all areas of society , the Internet provides us with a lot of services to the life and work to bring the convenience , but let's information security has become a very important issue . Because the browser 's widely used by hackers browser and third-party software vulnerabilities spread Trojan , obtain system privileges , vandalism, theft of user information , so that the interests of users has been a great loss. Trojan has spread fast , and simple deformation characteristics, traditional signature detection technology is difficult to detect the Trojan . Trojan detection method is necessary. Trojan Trojan and traditional difference is that the Trojan runs must use a browser . When the browser triggers the Trojan program, the Trojan will use the other system or browser vulnerabilities automatically configured Trojan server downloaded to the visitor's computer, and then run automatically to achieve the destruction, theft of computer information purposes. Therefore , the subject first proposed the theory of polynomial events using Bayesian model calculation procedure of threat be detected , and so determine whether the Trojan . Subject of the use of static code web applications and dynamic behavior as a detection feature , the use of the concept of information gain characteristics Filter . In the feature set of the screening process , characterized by a strong focus on topics occurrences . Topic is based on Bayesian classification method that uses an event based on word frequency polynomial model to calculate the unknown characteristics of web applications static and dynamic behavior code threat , respectively, with the corresponding threshold , thereby determining whether the program is to be detected Trojan . Finally , the experimental section to detect a new theoretical model designed Trojan detection system , and some of detection algorithm design and implementation of the system . Experimental verification of the feasibility of detection model for Trojan detection technology provides a new way of thinking.

Related Dissertations

  1. Design and Implementation of Drive Level Trojan Transmission and Encryption Algorithms,TP393.08
  2. Based on Data Mining Technology Jobs System Design and Implementation,TP311.13
  3. Research on Trojan Horse Transmis Sion Technology Based on HTTPS and WEB SERVICE Shanghai Jiao Tong University,TP393.08
  4. Trojan Principle Analysis and System Implementation,TP309.5
  5. A Study on Tax Auditing Model Based on Naive Bayesian Classification Method,F812.42
  6. Static and Dynamic Nonlinear Finite Element Analysis on Prestressed Hollow Slab Bridge,U441.3
  7. Research and Implementation of Computer Remote Control Based on Trojan Horse Technology,TP273
  8. Research on Network Communication Signature Generation Technology of Trojan Horses,TP393.08
  9. Research and Application of remote steal WINDOWS system,TP393.08
  10. Windows environment for Rootkit hidden Trojan detection technology,TP393.08
  11. Research on and Implementation of Controlling System Based on ICMP Protocol,TP393.08
  12. Based on Bayesian Classification Applied Research in Higher Vocational Teaching Software,TP311.5-4
  13. Research and Analysis on Dynamic Performance of Fuzzy Petri Net,TP301.1
  14. Classification for Webpage Trojan Detection Based on DOM Modeling,TP309.5
  15. TrojanUrlDetector: a Statistical Analysis Based Trojan URL Detecting System,TP393.08
  16. TrojanAntier: A Statistical Analysis Based Web Trojan Defense System,TP393.08
  17. Research into the Detection and Classification of Malware,TP393.08
  18. Research on Question Classifying of Chinese Question Answering System Based on Bayesian Classification,TP391.1
  19. Trojan Horse Attacks and a New Type of Trojan Detection Technology,TP309.5
  20. Anti - Trojan technology research based on identity checks,TP393.08
  21. A Study Implementation of Precaution Strategies Against PWS Trojan Attack,TP393.08

CLC: > Industrial Technology > Automation technology,computer technology > Computing technology,computer technology > Computer applications > Computer network > General issues > The application of computer network > Web browser
© 2012 www.DissertationTopic.Net  Mobile