Dissertation > Industrial Technology > Automation technology,computer technology > Computing technology,computer technology > General issues > Security and confidentiality > Computer viruses and prevention

Research and Realization of the Trojan Variability Analysis System Based on Genetic Algorithm

Author GuoYaGuang
Tutor XiaoShiSong
School Central China Normal University
Course Computer System Architecture
Keywords Trojan Feature extraction Genetic algorithm Analysis
CLC TP309.5
Type Master's thesis
Year 2012
Downloads 50
Quotes 0
Download Dissertation

In recent years, computers and the Internet have made an unprecedented development and popularization in China’s information construction, especially the rise of the Internet of Things and cloud computing, computer network security is facing more serious challenges.Computer viruses are one of the most serious hidden dangers in many security risks. especially the Trojan horse program and its variability,lead to more and more harm to the network securityThis paper firstly briefly introduces the origin,definition, operating principle and main characteristics of the trojans.Based on the analysis of the main function of the Trojan program and trojans invasion technology, this paper detailed analysis the physical life cycle and logical structure model of the trojans.And according to Trojan logic structure model builds up mathematical model of the trojans.In the current stage of the main Trojan detection technology, including static detection technology and dynamic detection technology,has the characteristics that obviously lagged behind the new Trojan variant, in this paper puts forward Trojan variation analysis system based on genetic algorithm.The system through extacting actual Trojan feature from the previous generation trojans,and use genetic algorithms to calculate the variation trend of the Trojans,Theoretically get a new generation characteristics of the trojans, And compared with the actual characteristics of the Trojans, verifying the fitness of the algorithm with the actual situation in order to improve the iterative times and the weights of the algorithm and so on,this process can be a cycle.The simulation experiments show that the algorithm and the results have better fitting through the limited circulation modification, Can better guide the detection of the future variation of the Trojans,and to prevent the invasion from a new generation of Trojan programs in advance.

Related Dissertations
More Dissertations