网络安全高级编程技术zw14.doc
![资源得分’ title=](/images/score_1.gif)
![资源得分’ title=](/images/score_1.gif)
![资源得分’ title=](/images/score_1.gif)
![资源得分’ title=](/images/score_1.gif)
![资源得分’ title=](/images/score_05.gif)
《网络安全高级编程技术zw14.doc》由会员分享,可在线阅读,更多相关《网络安全高级编程技术zw14.doc(34页珍藏版)》请在淘文阁 - 分享文档赚钱的网站上搜索。
1、网络安全高级软件编程技术第14章 基于特征码的恶意代码检测系统的设计与实现14.1编程训练目的与要求14.2相关背景知识14.2.1恶意代码的定义与分类1. 恶意代码的定义2. 恶意代码的分类14.2.2可执行文件结构介绍1. ELF文件图14-1ELF文件格式结构示意图2. PE文件图14-2PE文件格式14.2.3恶意代码检测技术与发展趋势1. 恶意代码检测部署方式2. 恶意代码检测技术功能分类图14-3恶意代码检测技术的技术组件与分析组件结构示意图3. 恶意代码检查数据类型分析4. 现有检测技术的缺陷及未来发展趋势14.2.4开源恶意代码检测系统Clam AntiVirus1. 简介2.
2、 Clam AntiVirus的特征码格式3. BM特征码匹配算法图14-4BM算法匹配示意图4. AC特征码匹配算法图14-5AC算法模式树图14-6模式树构造14.3实例编程练习14.3.1编程练习要求14.3.2编程训练设计与分析图14-7ClamScan恶意代码检测流程图1. 相关数据结构2. 病毒库导入3. AC特征码匹配算法初始化4. AC特征码匹配算法匹配查找5. A-C算法的扫描匹配函数6. B-M算法的扫描匹配函数14.4扩展与提高14.4.1使用Clam AntiVirus扫描邮件14.4.2基于可信计算技术的恶意代码主动防御技术1. 当前信息安全系统存在的问题2. 可信计
3、算技术图14-8可信计算平台通用结构图14-9TPM的内部结构参考文献1R.L.Rivest,A.Shamir,L.Adleman. A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Communications of the ACM 21 (2),19782Christian Kreibich,Jon Crowcroft. Honeycomb: creating intrusion detection signatures using honeypots. ACM SIGCOMM Computer
4、Communication Review,20043Lance Spitzner. Honeypots: Catching the insider threat. Computer Security Applications Conference,2003, Proceedings. 19th Annual4David Moore,Colleen Shannon,Douglas J. Brown,etc. Inferring Internet denial-of-service activity. ACM Transactions on Computer Systems (TOCS),2006
5、5Treshansky Allyn,McGraw Robert. An overview of clustering algorithms. Proceedings of SPIE-The International Society for Optical Engineering C,20016Lee Garber. Denial-of-service attacks rip the Internet. Computer,20007James F. Kurose,Keith W. Ross. Computer Networking: A Top-Down Approach Featuring
6、the Internet (3rd Edition). Addison Wesley,2005 8W.Richard Stevens. TCP/IP Illustrated Volume 1: The Protocols. Addison Wesley,1996 9Klaus Wehrle,etc. The Linux Networking Architecture: Design and Implementation of Network Protocols in the Linux Kernel. Prentice Hall,200410Christian Benvenuti. Under
7、standing Linux Network Internals. Oreilly Media Inc,200511Thomas H.Cormen,Charles E.Leiserson,Ronald L.Rivest,Clifford Stein. Introduction to Algorithms (2nd Edition). MIT Press,200112Alfred J.Menzes,Paul C. van Oorschot,Scott A.Vanstone. Handbook of Applied Cryptography. CRC Press,199613Atul Kahate
8、. Cryptography And Network Security (2nd Edition). McGraw-Hill,200814Charlie Kaufman,Radia Perlman,Mike Speciner. Network Security: Private Communication in a PUBLIC World. Prentice-Hall,200215Lance Spitzner. Honeypots: tracking hackers. Addison-Wesley Professional,200316Gary Halleen,Greg Kellogg. S
9、ecurity Monitoring with Cisco Security MARS. Cisco Press,200717Eric S.Raymond. The Art of UNIX Programming. Addison-Wesley,200518Data Encryption Standard. http:/en.wikipedia.org/wiki/Data_Encryption_Standard19Public-key cryptography. http:/en.wikipedia.org/wiki/Public-key_cryptography20tcpdump/libpc
10、ap. http:/www.tcpdump.org/21ebtables. 22netfilter. filter.org/23OpenSSL. http:/www.openssl.org/24Nmap. http:/nmap.org/25Snort. http:/www.snort.org/26Denial-of-service attack. http:/en.wikipedia.org/wiki/Denial-of-service_attack27Sebek: the honeypot project. http:/www.honeynet.org/project/sebek/28Boy
11、er-Moore string search algorithm. http:/en.wikipedia.org/wiki/Boyer%E2%80%93Moore_string_search_algorithm29Linux netfilter Hacking HOWTO. filter.org/documentation/HOWTO/netfilter-hacking-HOWTO.html30Oskar Andreasson. Iptables Tutorial 1.2.2.http:/iptables-31Beejs Guide to Network Programming Using I
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- 网络安全 高级 编程 技术 zw14
![提示](https://www.taowenge.com/images/bang_tan.gif)
限制150内