Previous Articles     Next Articles

The Digital Investigation and Forensics of Trojan Malware

LAN Yun%LI Bao-lin   

  • About author:华北科技学院计算机系,北京,101601%新疆维吾尔自治区公安厅网络安全保卫总队,新疆乌鲁木齐,830000

Abstract: Since the Trojan malware usually invades computing facilities secretly and eavesdrops on important information, it is very necessary to master the Trojan behavior, communication mechanisms and the way of eavesdrop, which can support the valuable intelligence clues for the network crime investigation. According to the characteristics of Trojan malware, this paper discusses the basis process of Trojan forensics investigation combing with experience of the network security department of public security organs. Meanwhile, it also introduces the common tools and methods for malware investigation. This paper describes some actual cases about the Trojan malware investigation technology involved the application in the network crime.