期刊文献+

Windows系统Rootkit隐藏技术研究与实践 被引量:8

Research and practice on concealing technology of Windows' Rootkit
下载PDF
导出
摘要 Rootkit是一组后门工具的集合,是特洛伊木马发展的高级阶段,其在特洛伊木马众多类别中危害性最大。深入研究Rootkit技术,做到网络攻防知己知彼,对防范木马攻击,减少网络破坏,保护重要信息系统有重要意义。通过研究Windows环境中Rootkit的隐藏技术,结合协同隐藏思想,提出了Rootkit的形式化模型,并在此基础上开发了一个Windows系统下的Root-kit原型。实验结果表明,该原型达到了较好的隐藏效果,可以避开目前大多数检测工具的检测。 Rootkit is a collection of tools that allows a hacker to provide a backdoor into a system, collect information on other systems on the network, mask the fact that the system is compromised, and much more. It makes more damage to computer information resources in the network, compared with the usual Trojan horse. Researching Rootkit is significant to defend Trojan horse attacking, reduce the loss of network, and protect the kernel information system. Based on the study of the concealing technology of Rootkit on Windows system, it presents an idea of cooperative concealment between Rootkit's components, and also gives its formal model. Finally, a Rootkit prototype on the windows is proposed. The experiment shows that it owns a satisfied concealing, and can avoid most of current real-time detection.
出处 《计算机工程与设计》 CSCD 北大核心 2007年第14期3337-3340,3343,共5页 Computer Engineering and Design
基金 国家电子政务信息安全保障试点工作基金项目(200402008)
关键词 特洛伊木马 隐藏技术 协同隐藏 形式化模型 网络安全 trojan horse concealing technology cooperative concealment formal model network security
  • 相关文献

参考文献8

  • 1NSA.NSA glossary of terms used in security and intrusion detection[DB/OL].2005.
  • 2CERT/CC,CA-1994-01[EB/OL].http://www.cert.org/advisories/CA-1994-01.html,2006.
  • 3Ivo Ivanov.API hooking revealed[EB/OL].http://www.codeguru.com/Cpp/W-P/system/misc/article.php/c566 7,2006.
  • 4Yariv Kaplan.API spying techniques for Windows 9x,NT and 2000[EB/OL].http://www.internals.com/articles/apispy/apispy.htm,2006.
  • 5Jeffrey Richter.Programming applications for Microsoft Windows[M].4th Ed.USA:Microsoft Press,2000:515-564.
  • 6王雨,傅鹤岗.挂接系统服务调度表实现对Win2k的访问控制[J].计算机工程与设计,2005,26(2):407-409. 被引量:7
  • 7Greg Hoglund,James Butler.Rootkits:Subverting the Windows kernel[M].Addison Wesley Professional,2005.
  • 8张新宇,卿斯汉,马恒太,张楠,孙淑华,蒋建春.特洛伊木马隐藏技术研究[J].通信学报,2004,25(7):153-159. 被引量:43

二级参考文献15

  • 1ART Baker JERRY Lozano.Windows2000设备驱动程序设计指南[M].北京:机械工业出版社,2001..
  • 2[1]David A Solomon,Mark E Russinovich.Windows 2000 内部揭密[M].北京:机械工业出版社,2001.
  • 3[4]Marshall Brain.Win32系统服务开发与实例[M].北京:电子工业出版社,2001.
  • 4[6]Microsoft Corporation.Windows2000驱动程序开发大全设计指南[M].第1卷.北京:机械工业出版社,2001.
  • 5[7]Microsoft Corporation.Windows2000驱动程序开发大全参考手册[M].第2卷.北京:机械工业出版社,2001.
  • 6JeffreyRichter.Windows核心编程[M].北京:机械工业出版社,2000..
  • 7ADLEMAN L M. An abstract theory of computer viruses[A]. 8th Annual International Cryptology Conference[C]. Santa Barbara, California, USA, 1988.
  • 8COHEN F. Computer viruses: theory and experiments[J]. Computers and Security, 1987, 6(1): 22-35.
  • 9COHEN F. On the implications of computer viruses and methods of defense[J]. Computers and Security, 1988, 7(2):167-184.
  • 10COHEN F. A Cryptographic checksum for integrity protection[J]. Computers and Security, 1987, 6(6): 505-510.

共引文献48

同被引文献62

引证文献8

二级引证文献22

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部