International Journal of Advanced Science and Research

International Journal of Advanced Science and Research


International Journal of Advanced Science and Research
International Journal of Advanced Science and Research
Vol. 7, Issue 1 (2022)

A mechanism to reduce the probability of trojan horse attacks on computers


Huakun Wu, Yahui Meng, Z Y Chen, Wanting Chen, Timothy Chen

Purpose: By dividing the information in the information system into different security levels, it ensures the isolation of different levels of information, and those with different permissions Each user can access different levels of confidential information. Design/methodology/approach: The main function of access control is to allow legitimate users to access and use the protected resources and services of the system, and to prevent illegal users from accessing and obtaining related resources and services. Trust management is a common method used to explain security policies, it provides a standard and common mechanism for security policies and review the corresponding security of important operations, and directly authorize them after the review is passed. Findings: Considering the relationship between different levels of defense capability and security, this paper discusses the data path that trojan attack network must rely on, and attack methods from a single source node to an intermediate node or from a single source node to a tail node or from a single source node to attack both the intermediate node and the tail node at the same time. Three probability models are established to discuss the relationship between attack probability of Trojan horse among nodes. Originality/value: Considering the relationship between different levels of defense capability and security, this paper discusses the data path that trojan attack network must rely on, and attack methods from a single source node to an intermediate node or from a single source node to a tail node or from a single source node to attack both the intermediate node and the tail node at the same time. Three probability models are established to discuss the relationship between attack probability of Trojan horse among nodes. Finally, the model is applied to an enterprise information system, and the result is reasonable.
Download  |  Pages : 21-27
How to cite this article:
Huakun Wu, Yahui Meng, Z Y Chen, Wanting Chen, Timothy Chen. A mechanism to reduce the probability of trojan horse attacks on computers. International Journal of Advanced Science and Research, Volume 7, Issue 1, 2022, Pages 21-27
International Journal of Advanced Science and Research International Journal of Advanced Science and Research