期刊文献+

基于句柄分析的Windows Rootkit检测技术研究 被引量:2

Windows Rootkits’s Detection based on Handle Analysis
原文传递
导出
摘要 作为网络入侵领域的一种新兴技术,Rootkit能隐藏入侵痕迹、阻止用户和检测软件发现恶意代码的存在,具有隐蔽性好、难以检测等特点。根据对Rootkit行为的分析,提出了一种基于句柄分析的Rootkit检测技术,该方法通过遍历内核句柄表,得到系统中运行的所有进程,再与调用API得到的进程列表对比,发现Rootkit隐藏的进程。实验证明,该方法对于Rootkit具有良好的检测效果。 Rootkit is a new technology in network intrusion, which could hide the trace of vicious behaviors and thus prevent the finding of malware by users and detection software. The behavior of common Rootkit has been analyzed and a method for detecting Rootkit based on handle analysis is proposed. Through comparing the process list obtained from API and scanning handle table, the hidden processes of Rootkit could be found. The experiment shows that this method could find the Rootkit hiding in the Windows OS.
出处 《通信技术》 2009年第4期135-138,共4页 Communications Technology
关键词 ROOTKIT 隐藏进程 句柄分析 Rootkit hidden process handle analysis
  • 相关文献

参考文献5

  • 1Hoglund G, Butler J. Rootkits:Subverting the Windows Kernel[M].Addison-Wesley Professional.
  • 2Detection of Hidden Process, http://community, reverse-engineering, net/View topic, php?t=4685,2005-03.
  • 3Russinovich M, Solomom D. Microsoft Windows Internals, Fourth Edition[M].Microsoft Press, 2005.
  • 4王驎峰,董亮卫.Windows(2000/XP)下隐藏进程的检测机制[J].计算机工程,2006,32(20):95-96. 被引量:7
  • 5PJF. IceSword[EB/OL]. http://www. blogcm com/us-er17/pjf/ index, html.

二级参考文献2

  • 1Solomon D A,Russinovich M E.Inside Microsoft Windows2000 (Thrid Edition)[M].美国:微软出版社,2000.
  • 2Microsoft公司.Windows Device Driver Development Kit Design Guide[M].美国:微软出版社,2001.

共引文献6

同被引文献16

  • 1段钢.加密与解密[M].第3版.北京:电子工业出版社,2009.
  • 2WANG Yulin,SHEN Yang,PAN Jian.Usage Control Based on Windows Kernel Hook[C].Jeju Island,South Korea:International Conference on Information and Multimedia Technology,2009:264-267.
  • 3MARHUSIN Mohd Fadzli,LARKIN Henry,LOKAN Chris,et al.An Evaluation of API Calls Hooking Performance[C].Suzhou,China:Computational Intelligence and Security,2008:315-319.
  • 4RABER Jason,KRUMBEUER Brian.Hyatt Regency Crystal City:.QuietRIATT:Rebuilding the Import Address Table Using Hooked DII Calls[R].[s.l.]:Riverside Research Institute,2009.
  • 5MOSER Andreas,KRUEGEL Christopher,KIRDA Engin.Exploring Multiple Execution Paths for Malware Analysis[C].Berkeley,California:IEEE Symposium on Security and Privacy,2007:231-245.
  • 6WILLEMS Carsten,HOLZ Thorsten,FREILING Felix.Toward Automated Dynamic Malware Analysis Using CWSsandbox[J].IEEE Security and Privacy,2007,05(02):32-39.
  • 7NEIGER G,SANTONI A,LEUNG F. Intel Virtualization Technology:Hardware Support for Efficient Processor Virtualization[J].Intel Technology Journal,2006,(03):167-177.
  • 8朱雁辉.Windows防火墙与网络封包截获技术[M]北京:电子工业出版社,2009.
  • 9陈莉;周安民.基于行为逻辑的文件安全性检测研究[D]成都:四川大学,2010.
  • 10贺青,王轶骏,薛质.基于Xen硬件虚拟机的虚拟蜜网研究[J].信息安全与通信保密,2008,30(6):83-85. 被引量:3

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部