期刊文献+

Rookit木马的隐藏机理与检测技术剖析 被引量:3

The hiding theory of Rookit trojan and analysis of the detection technique
下载PDF
导出
摘要 随着网络技术的发展,基于传统隐藏技术的木马已经很难生存,木马隐藏技术开始由Ring 3级转入Ring 0级.运行在Ring 0级的木马,拥有与系统核心同等级的权限,隐藏与伪装更为容易.笔者讨论了Windows内核系统服务调用机制,分析了删除进程双向链表中的进程对象、SSDT内核挂钩注册表隐藏、端口隐藏等Rootkit木马的隐藏机理,最后对Rookit木马的几种检测技术作了详细的剖析.研究内容对增强人们防患意识、更好地维护计算机系统的安全有一定的参考价值. With the development of cyber technology ,the Trojans are difficult to exist based on traditional hiding techniques. As a result, the hiding of Trojans starts to shift from level Ring 3 to Ring 0. The Trojans run in level Ring 0 with the same class of authority of the system and can be , more easily hidden and disguised. The essay discusses kernel system of windows and analyses the Process objects in the doubly linked list, of the deleting process. Registry hiding by SSDT kernel hooking,port hiding,etc. In the end, the essay makes detailed analysis about several detection techniques against Rookit Trojan. The essay study has some reference value in enhancing people's awareness of prevention and better safeguarding the security of computer systems.
作者 李锦
出处 《辽宁师范大学学报(自然科学版)》 CAS 2009年第2期174-176,共3页 Journal of Liaoning Normal University:Natural Science Edition
关键词 Rookit木马 系统调用 隐藏机理 入侵检测 Rootkit trojan system call hiding theory intrusion detection
  • 相关文献

参考文献6

二级参考文献15

  • 1王强,吕光宏.IPV6的网络安全性[J].电信快报,2005(12):40-43. 被引量:1
  • 2卞斌.IPV6中的安全协议及安全问题[J].信息安全与通信保密,2006,28(1):50-52. 被引量:5
  • 3何中林.IPv6技术及其安全机制研究[J].黄冈师范学院学报,2005,25(6):58-61. 被引量:3
  • 4GregHoglund. Nt rootkit [EB/OL]. http://www.megasecurity. org/trojans/n/nt rootkit/Nt_rootkit.html.
  • 5Fuzen_op. FU_Rootkit [EB/OL] .https://www.rootkit.com/vault/ fuzen_op/fuTootkit.zip.
  • 6Prasad Dabak,Milind Borate.Undocumented Windows NT[M]. America:John Wiley & Sons,2000.
  • 7Mark Russinovich. RootkitRevealer[EB/OL]. http://www. microso ft.com/technet/sysintemals/Utilities/RootkitRevealer.mspx.
  • 8Resplendence. RootKit Hook Analyzer[EB/OL]. http://www. resplendence.com/hookanalyzer.
  • 9Gary Nebbett. Windows NT 2000 native API reference [M]. America:Sams,2001.
  • 10Walter Oney.Windows driver model[M].America:Microsoft Press, 2001.

共引文献9

同被引文献26

  • 1张新宇,卿斯汉,马恒太,张楠,孙淑华,蒋建春.特洛伊木马隐藏技术研究[J].通信学报,2004,25(7):153-159. 被引量:43
  • 2李伟斌,王华勇,罗平.通过注册表监控实现木马检测[J].计算机工程与设计,2006,27(12):2220-2222. 被引量:16
  • 3卢浩,胡华平,刘波.恶意软件分类方法研究[J].计算机应用研究,2006,23(9):4-7. 被引量:9
  • 4特洛伊木马,百度百科.http://baike.baidu.com/view/2611.htm.
  • 5Alkabani,Y.Koushanfar,F.Extended abstract:Designer's hardware Trojan horse.Hardware-Oriented Security and Trust,2008.HOST 2008.IEEE Intemational Workshop on.2008,9(9):82-83.
  • 6木马病毒发展史.http://www.51cto.com/tml/2005/1217/14782.htm.
  • 7木马技术发展趋势回顾.百度空间.http://hi.baidu.com/liuzd003/blog/item/4763bld636af6d2906088ba4.html.
  • 8Rootkit木马:隐藏技术发展的颠峰.百度空间.http://hi.baidu.com/.
  • 9CHEN Qin-Zhang,CHENG Rong,GU Yu-Jie.Classification Algorithms of Trojan Horse Detection Based on Behavior.2009 International Confe:rence on Multimedia Information Networking and Security.
  • 10METHOD.Yu feng liu,Li-wei Zhang,Jian Liang,Sheng Qu.etc.Proceedings of the Ninth Intemational Conference on Machine Leaming and Cybernetits,Qingdao,.11-14 July 2010.

引证文献3

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部