Professional Documents
Culture Documents
Sai Praveen, Computer Science and Engineering, Lovely Professional University, Jalandhar
Saipraveen791@gmail.com
ABSTRACT
In recent years, the fast development of computer network technology, has become an integral
part of human’s life, work and study. But with the popularity of the Internet, computer viruses,
Trojans and other new terms have become some well-known network vocabularies. Studies have
shown that most users of computer are suffered from computer virus. People must attach great
importance to the network security problem. The paper studied Trojan virus. Paper first
introduced the concept, characteristics and categories of the Trojan virus and its harm, and then
focused on the way and means of the Trojan’s spread. It introduced the Trojan virus loading and
hiding technology, too. Its last part focused on the prevention measures, it put forward
reasonable suggestions to users, and paper also put forward prevention advice to improve
network security.
INTRODUCTION
The current world has entered into information time with the development of computer
network, while internet has become indispensable in life, work, and study. However, the virus
attack becomes increasingly popular because of the development and strengthening of internet.
Various attack methods greatly threat the property security of human beings. Trojan horse virus
is one of the major methods of network. Therefore, we need to make study to know more
fundamental knowledge, communication methods, and work process to take precautionary
measures to further enhance the network protection and construct harmonious network
environment.
DESCRIPTION
Mostly Trojans are introduced via email attachments. These emails are disguised in a way that
they look authentic. Once the user downloads the attached file and runs it, the file starts
corrupting the system. A Trojan can also come as a payload with freeware and shareware
available on the Internet. Although every freeware doesn't come with Trojan, it is still advised
that one should download software and freeware from authentic sources only. It is also
imperative that you be very careful while making the selections at the time of installation. Trojans
can have multiple usages, which depend on the motives of the attacker. These could be identity
theft, data theft, crashing computers, spying or tracking user activities. Generally, Trojans are
identified by most anti-virus software and do not harm the computer unless they are executed.
Also, they do not replicate but can come attached to a virus which can spread to other computers
across the network. Installing a good and licensed anti-virus software, keeping virus definitions
of computers up-to-date, being cautious while opening email attachments even if it looks
authentic and paying attention towards system security popup messages are some of the ways
by which you can keep a computer safe and secure. Trivia: The term Trojan horse comes from
the Greek-Trojan war, in which Greeks infiltrated the city of Troy by sending soldiers covertly
inside a huge wooden horse as a gift to the Trojan King.
Backdoor:
A backdoor Trojan gives the hackers malicious access to take remote control over the
infected computer. They entitle the malicious hacker to work on the infected computer
as per the malicious intentions. They can send, receive, delete and launch files, display
data and reboot the computer. Backdoor Trojans are mostly used by hackers to exploit a
group of infected computers to form a zombie network or malicious botnet that can be
used for criminal purposes.
Exploit:
Exploit is a type of Trojan that contains a malicious code or data to attack a vulnerable
software or application that runs on an infected computer.
Rootkits:
Root kits are developed by malware authors to gain access to the victim’s system, while
they conceal their presence or their malicious activities from being detected to extend
their presence to run and execute on the infected computer.
Trojan-Banker:
This is a type of trojan developed to extract user's account data, debit or credit card data
through online banking systems, e-payment gateway.
Trojan-DDoS:
These programs are developed to perform Denial of Service (DOS) attacks so it will infect
the victim's web address. the malware program sends multiple from the victim's infected
computer and forms a network with several other infected computers –to strongly
enforce an attack against the target address causing a denial of service.
Trojan-Downloader:
Trojan-Downloaders as the name suggests, it is developed by hackers to download and
install new versions of malicious programs onto the target victim's computer.
Trojan-Dropper:
These programs are developed by malware authors to install Trojans/viruses and escape
the detection of malicious programs. Most of the traditional antivirus programs are
inefficient to scan all the components this Trojan.
Trojan-Fake-AV:
Trojan-Fake AV programs pretend to operate like an antivirus software. They are
developed by cyber thieves to obtain money from the target user – in return, in order to
detect and remove threats, despite the threats that they report are non-existent in real-
time.
Trojan-Game-Thief:
The main targets for Trojan-Game Thief are online gamers and their prime motive is to
steal the user account information.
Trojan-IM:
Trojan IM programs primarily extract users' logins and passwords of Skype, Facebook
Messenger, ICQ, MSN Messenger, Yahoo Pager, AOL, and many more.
Trojan-Ransom:
Trojan Ransom is developed to alter data on the victim's computer – so that the system
doesn’t perform its function correctly and it does not let the user, use certain data. The
criminal would demand a ransom to be paid by the victim to unblock the restricted access
to the data and restore the computer’s performance.
Trojan-SMS:
Trojan SMS programs send text messages from the victim's mobile device to other phone
numbers.
Trojan-Spy:
Trojan Spy programs, as the name suggests, can spy on how the victim is using the
computer – for example, tracking data, taking screen shots or extracting a list of running
applications.
Trojan-Mail-finder:
These programs are developed by hackers to extract email addresses from the victim's
computer.
REFERENCES
[1] Zhang Xiaolei, the diagnosis and prevention of computer virus. Beijing: China
Environmental Science Press, 2008.
[2] Zhang Yousheng, Computer virus and Trojan horse program analysis. Beijing: Beijing Kehai
Electronic Press, 2009,
[3] Du Lei. Analysis and prevention of computer viruses. Silicon Valley, 2008.
[4] Zhuo Wenjian, Principle of computer virus and prevention and cure. Beijing: Beijing
University of Posts and Telecommunications press, 2004.
[5] Wang Shusen, Chen Ping. The Trojan horse attack principle and control strategy of
software guide, 2012.
[6] Peng Guojun, Fu Jianming, Zhang Huanguo. Analysis of computer viruses and
confrontation. Wuhan: Wuhan University press, 2009.
[7] Zhang Xinyu, Secretary of state Schan, Ma tsuneta. Technology research. Journal of China
Institute of communications Troy hidden Trojan, 2004,26.
[8] Liu Gongshen, Computer virus and its prevention and control technology. Beijing:
Tsinghua University press, 2008.
[9] Wang Wei, Ning Yupeng etal, Firewall principle and technology. Beijing: Machinery
Industry Press, 2006.
[10] Wally, Computer virus prevention art. Beijing: Mechanical Industry Press, 2007.