´c·Nµ{¦¡¤J«Iªº¦w¥þŲ§O»P¨¾¨î---¥HTrojan Horse ¬°¨Ò

 

Security Forensics and Empirical Strategies for Preventing from the Intrusion of Trojan Horse

 

¤ý¦°¥¿

¤¤¥¡Äµ¹î¤j¾Ç¸ê°TºÞ²z¬ã¨s©Ò

sjwang@sun4.cpu.edu.tw

 

°ª¤j¦t

¦D¨ÆÄµ¹î§½°»¤E¶¤

dayu@email.cib.gov.tw

 

ºK­n

ªñ´Áµøµ¡«¬Trojan Horse§Ö³t¬y¦æ¡A¹ï¹q¸£¨Ï¥ÎªÌ¦s¦³­t­±ªº¦w¥þ¦M¾÷¡A¬°¨ó§U¹q¸£¨Ï¥ÎªÌªý¾×¥~¨Óªº«I¤J§ðÀ»¡A¾A®É±Ä¦æ¦X©yªº¨¾¨î±¹¬I¡A­°§C¨ü§ðÀ»ªÌªº«I®`µ{«×¡A¦]¦¹§Ú­ÌÂǥѦ¬¶°¬ÛÃöTrojan Horse¶i¦æ¹êÅç¼ÒÀÀ¡A¥H¦]À³ºô¸ô¸ê°T¥Ç¸oªº´c·Nµ{¦¡¦æ¬°¡C¥»¤å¹Á¸Õ¸ÑŪµøµ¡«¬Trojan Horseªº¹B§@¯S½è»P¹ê½è¤º®e¡AµÑ¨ú¥X¸û¬°ÅãµÛªº§ðÀ»¯S¼x¡A¦A³z¹L±´°Qµ{¦¡ªº·P¬V¹ê§@²Ó¸`¡AŲ§O¥X§ðÀ»¹Lµ{¨Æ«e¡B¨Æ¤¤¤Î¨Æ«á¤£¦P®É´Áªº¨¾Å@±¹¬I¡A¥HÂk¯Ç¥X¦@³qªº¼Ð·Ç¦w¥þÀˮ֪í¡A§@¬°º¸«áÃѧO·s«¬´c·NTrojan Horseªº¥D­n¨Ì¾Ú¡C¦¹¥~¡A¥çÂÇ¥ÑÆ[¹î¬ÛÃöÀ³¥Îµ{¦¡¤Î³q°T°ðªº³s½u¥Øªº¤è¦¡¡A¯à¨Æ¥ýª¾¹D²§ª¬¤D¤J«I¤§¼x¥ü¡A¥HªýÂ_¥iºÃªº¤J«I¨Æ¥ó¡A¶i¦Ó¬ãÀÀ´£¤É°l½r§Þ¯àªº¤èªk¡A¦³®Ä¸Ñ¨M¬ÛÃö®×¨Òµo¥Í¤§³B¸m®Ä¯à¡C

 

Abstract

In recent years, the program of Trojan horse on the platform of window system has been emerging in the Internet applications. While the kind of such program is subject to the malicious program to risk the networked computer usage. In this paper, we propose the strategies to curb and lessen the influences when the computer working programs infected by the Trojan horse. The way to compass our conclusions is the collections of a sequence of experimental results. We analyze the execution of the Trojan and the aftermath infected by the Trojan on the window system of PC, in such a way that there are a number of remarkable characteristics of the running Trojan are featured in the course of elaborate experiments. Accordingly, the secure criterion tables are summarized to effectively predict, detect and deter from the possible threats in the three periods of before, middle and after happening. Besides, the relevant application programs and network communication ports open to the user connection in networks are also investigated, in the manner that the feasible mechanisms to withstand the attacks issued from the kinds of malicious programs are then kept trace. The explorations will profit the seizure of computer crime caused from malicious programs.

ÃöÁäµü¡G¹q¸£Àb«È¡B¹q¸£¦w¥þ¡B´c·Nµ{¦¡¡BTrojan Horse¡B¦w¥þŲ§O