作者投稿和查稿 主编审稿 专家审稿 编委审稿 远程编辑

计算机工程 ›› 2008, Vol. 34 ›› Issue (7): 157-159,. doi: 10.3969/j.issn.1000-3428.2008.07.055

• 安全技术 • 上一篇    下一篇

基于WebMail系统的新型木马通信模型

王 娟1,郭永冲2,王 强3   

  1. (1. 南开大学信息技术科学学院,天津 300071;2. 中国人寿保险股份有限公司信息技术部,北京 100020; 3. 西安空军工程大学电讯工程学院,西安 710077)
  • 收稿日期:1900-01-01 修回日期:1900-01-01 出版日期:2008-04-05 发布日期:2008-04-05

New Trojan Horse Communication Model Based on WebMail System

WANG Juan1, GUO Yong-chong2, WANG Qiang3   

  1. (1. College of Information Technology and Science, Nankai University, Tianjin 300071; 2. Department of Information Technology, China Life Insurance Company Limited, Beijing 100020; 3. College of Telecommunication Engineering, Xi’an Air University of Engineering, Xi’an 710077)
  • Received:1900-01-01 Revised:1900-01-01 Online:2008-04-05 Published:2008-04-05

摘要: 研究特洛伊木马在网络通信方面所采用的技术方法,提出一种利用WebMail系统作为“中转站”的木马通信模型。在该模型中,木马被控端使用HTTP协议访问互联网中的WebMail系统,可轻易突破局域网防火墙,且不要求公网的或固定IP地址,能在网吧等环境中实施控制。通过实现一个原型木马验证该模型的有效性和危害性,并针对此类木马的特点提出防御建议。

关键词: 网络安全, 特洛伊木马, WebMail系统, HTTP协议, 电子邮件

Abstract: Communication technologies of Trojan horses are studied, and a communication model using WebMail system as a broker is proposed. With the model, the controlled end of the Trojan horse accesses WebMail systems in Internet by HTTP and can easily pass through the firewall of LAN. The controller does not need public or fixed IP addresses, so it can work well in places like cybercafe. To validate the model and evaluate its hazard, a prototype Trojan horse is designed. Some advices on protection against this kind of Trogan horse.

Key words: network security, Trojan horse, WebMail system, HTTP, E-mail

中图分类号: