期刊文献+

Windows下内核级木马隐藏技术研究

Research on Concealment Technology of Kernel-based Trojan Horse Under Windows
下载PDF
导出
摘要 木马技术是网络安全的重要方面,也是网络攻击中获取信息的重要途径。隐藏技术是木马的关键技术之一,其直接决定木马的生存能力。从Rootkit的原理分析出发,深入的研究Windows下内核级木马的隐藏技术,并在此基础上实现一个内核级木马原型,最后介绍内核级木马的检测和应对策略。 Trojan horse technology is an important part in the research of network security, and it's also an important way to get information from the network. This paper mainly analyzes the concealment and detecting technology of windows Rootkit - based trojan horse. A kernel - level Trojan horse system is implemented as well. Finally, some ways to detect Trojan horse are described in detail.
作者 刘德 甘早斌
出处 《微处理机》 2009年第1期41-44,48,共5页 Microprocessors
关键词 特洛伊木马 内核Rootkit 隐藏技术 Trojan horse Rootkit Concealment
  • 相关文献

参考文献8

  • 1Greg Hoglund, James Butler. Rootkits: Subverting the Windows Kernel [ M ]. Addison Wesley Professional. 2005.7.
  • 2[美]Ed Skoudis,Lenny Zelter.决战恶意代码[M].北京:电子工业出版社,2005.
  • 3Jamie Butler, Bill Arbaugh, Nick Petroni. R_: The Exponential Growth of Rootkit Techniques [ EB/OL ]. http ://www. blackhat. com/presentations/bh - usa - 06/BH - US - 06 - Butler. pdf. 2006.
  • 4James Butler, Sherri Sparks. Windows rootkits of 2005, part one [ EB/OL]. http://www. seeurityfoeus. com/ print/infocus/1850. 2005 - 11 - 04.
  • 5Holy Father. How to become unseen on Windows NT[ EB/ OL]. http ://www. rootkit, com/newsread, php? newsid = 36. 2003.12.
  • 6Greg Hoglund, et al. ROOTKIT home [ EB/OL ]. http :// www. rootkit. com.
  • 7Holy Father. Hacker Defender Home [ EB/OL ]. http:// hxdef. org.
  • 8DilDog, et al. Back Orifice 2000 [ EB/OL]. http ://www. bo2k. com.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部