摘要
分析了rootkit的构成 ,并举例介绍rootkit的入侵原理和入侵技术 ,并提出了在unix系统中如何发现、清除和防范rootkit的攻击 。
Rootkit is one of the most popular attack on the internet, the author analyses the various strains of rootkit and their component in unix systems, and discuss how to recognize and detect an attacked system, how to clear up and recover from intruder of the rootkit, and to prevent your unix system from the attack.
出处
《华中科技大学学报(自然科学版)》
EI
CAS
CSCD
北大核心
2003年第S1期171-173,共3页
Journal of Huazhong University of Science and Technology(Natural Science Edition)