计算机工程与应用 ›› 2007, Vol. 43 ›› Issue (24): 141-145.

• 网络、通信与安全 • 上一篇    下一篇

基于限定令牌的木马防护系统设计

郝东白,郭 林,黄 皓   

  1. 南京大学 计算机科学与技术系,软件新技术国家重点实验室,南京 210093
  • 收稿日期:1900-01-01 修回日期:1900-01-01 出版日期:2007-08-21 发布日期:2007-08-21
  • 通讯作者: 郝东白

Design of defense against trojan horse system based on restricted token

HAO Dong-bai,GUO Lin,HUANG Hao   

  1. State Key Lab for Novel Software Technology,Department of Computer Sci. and Tech.,Nanjing University,Nanjing 210093,China
  • Received:1900-01-01 Revised:1900-01-01 Online:2007-08-21 Published:2007-08-21
  • Contact: HAO Dong-bai

摘要: 在研究木马的攻击模式、种植方式和Windows安全机制的基础上,通过对当前木马检测技术的弱点分析,提出了一种基于限定令牌的木马防护系统。该系统从构建工作环境控制着手,实现程序运行审核机制,变查杀为抑制,抑制木马的运行及攻击行为的实施。并重点介绍了进程环境控制模块、服务管理模块、注册表监控模块和异常诊断模块的设计。最后,通过实验验证了该系统的可行性和有效性。

关键词: 木马, 防御, 令牌, 特权, 环境控制

Abstract: According to the analysis of Trojan horse attack patterns,implant methods ,the security model of windows and limitations of the Trojan horse detection technologies at present,A defense against Trojan horse system based on restricted token is stated in this paper.Combined with constructing the secure work environment,auditing the startup of applications and restraining the malicious action of Trojan horse.The design of process environment control module,service manager module,register monitoring and anomaly diagnose module are focused on.At last,the experiment result validates the feasibility and availability of this system.

Key words: trojan horse, defense, token, privilege, environment control