´c·Nµ{¦¡¤J«Iªº¦w¥þŲ§O»P¨¾¨î---¥HTrojan Horse ¬°¨Ò
Security Forensics and Empirical Strategies for Preventing from the
Intrusion of Trojan Horse
¤ý¦°¥¿
¤¤¥¡Äµ¹î¤j¾Ç¸ê°TºÞ²z¬ã¨s©Ò
°ª¤j¦t
¦D¨ÆÄµ¹î§½°»¤E¶¤
dayu@email.cib.gov.tw
ºKn
ªñ´Áµøµ¡«¬Trojan Horse§Ö³t¬y¦æ¡A¹ï¹q¸£¨Ï¥ÎªÌ¦s¦³t±ªº¦w¥þ¦M¾÷¡A¬°¨ó§U¹q¸£¨Ï¥ÎªÌªý¾×¥~¨Óªº«I¤J§ðÀ»¡A¾A®É±Ä¦æ¦X©yªº¨¾¨î±¹¬I¡A°§C¨ü§ðÀ»ªÌªº«I®`µ{«×¡A¦]¦¹§ÚÌÂǥѦ¬¶°¬ÛÃöTrojan
Horse¶i¦æ¹êÅç¼ÒÀÀ¡A¥H¦]À³ºô¸ô¸ê°T¥Ç¸oªº´c·Nµ{¦¡¦æ¬°¡C¥»¤å¹Á¸Õ¸ÑŪµøµ¡«¬Trojan Horseªº¹B§@¯S½è»P¹ê½è¤º®e¡AµÑ¨ú¥X¸û¬°ÅãµÛªº§ðÀ»¯S¼x¡A¦A³z¹L±´°Qµ{¦¡ªº·P¬V¹ê§@²Ó¸`¡AŲ§O¥X§ðÀ»¹Lµ{¨Æ«e¡B¨Æ¤¤¤Î¨Æ«á¤£¦P®É´Áªº¨¾Å@±¹¬I¡A¥HÂk¯Ç¥X¦@³qªº¼Ð·Ç¦w¥þÀˮ֪í¡A§@¬°º¸«áÃѧO·s«¬´c·NTrojan
Horseªº¥Dn¨Ì¾Ú¡C¦¹¥~¡A¥çÂÇ¥ÑÆ[¹î¬ÛÃöÀ³¥Îµ{¦¡¤Î³q°T°ðªº³s½u¥Øªº¤è¦¡¡A¯à¨Æ¥ýª¾¹D²§ª¬¤D¤J«I¤§¼x¥ü¡A¥HªýÂ_¥iºÃªº¤J«I¨Æ¥ó¡A¶i¦Ó¬ãÀÀ´£¤É°l½r§Þ¯àªº¤èªk¡A¦³®Ä¸Ñ¨M¬ÛÃö®×¨Òµo¥Í¤§³B¸m®Ä¯à¡C
In recent
years, the program of Trojan horse on the platform of window system has been
emerging in the Internet applications. While the kind of such program is subject
to the malicious program to risk the networked computer usage. In this paper,
we propose the strategies to curb and lessen the influences when the computer
working programs infected by the Trojan horse. The way to compass our
conclusions is the collections of a sequence of experimental results. We
analyze the execution of the Trojan and the aftermath infected by the Trojan on
the window system of PC, in such a way that there are a number of remarkable
characteristics of the running Trojan are featured in the course of elaborate
experiments. Accordingly, the secure criterion tables are summarized to
effectively predict, detect and deter from the possible threats in the three
periods of before, middle and after happening. Besides, the relevant application
programs and network communication ports open to the user connection in
networks are also investigated, in the manner that the feasible mechanisms to
withstand the attacks issued from the kinds of malicious programs are then kept
trace. The explorations will profit the seizure of computer crime caused from
malicious programs.
ÃöÁäµü¡G¹q¸£Àb«È¡B¹q¸£¦w¥þ¡B´c·Nµ{¦¡¡BTrojan Horse¡B¦w¥þŲ§O