期刊文献+

基于文件系统异常的内核级Rootkit检测 被引量:1

Detecting kernel-level Rootkit based on filesystem anomalies
下载PDF
导出
摘要 分析现有的两类Rootkit检测方法。根据内核级Rootkit在系统中的隐藏机制,提出了一种基于文件系统异常的有效检测方法。实验表明,该方法能够简便快捷地检测出内核级Rootkit的存在,帮助系统管理员进一步维护系统安全。 This paper analyzed the existed methodologies to detect Rootkit. According to the hiding mechanism of kernel-level Rootkit in the operating system, proposed an effective detecting method based on filesystem anomalies. The experiment indicates that it can detect the existence of kernel-level Rootkit in a simple process and help system administrators further maintain security.
出处 《计算机应用研究》 CSCD 北大核心 2009年第8期3056-3057,3062,共3页 Application Research of Computers
关键词 内核级Rootkit 文件系统异常 硬链接数 总块数 kernel-level Rootkit filesystem anomalies hard link count total block count
  • 相关文献

参考文献7

  • 1SANS.Intrusion discovery cheat sheet v1.3 Linux[].ht-tp://wwwsansorg/resources/linsacheatsheetpdf.
  • 2DITTRICHD.“Root Kits”and hiding files/directories/processes af-ter a break-in. http://staff.washington.edu/dittrich/misc/faqs/rootkits.faq . 2002
  • 3LEVINE J G,,GRIZZARD J B,OWEN H W.A methodology to de-tect and characterize kernel level Rootkit exploits involving redirectionof the system call table[].Proc of the nd IEEE International In-formation Assurance Workshop.2004
  • 4Pragmatic/THC.Complete Linux loadable kernel modules. http://packetstormsecurity.org/docs/hack/LKM_HACKING.html . 1999
  • 5LEVINE J G,GRIZZARD J B,HUTTO P W,et al.A methodologyto characterize kernel level Rootkit exploits that overwrite the systemcall table[].Proc of IEEE Southeast Conference.2004
  • 6KRUEGEL C,ROBERTSON W,VIGNA G.Detecting kernel-levelRootkits through binary analysis[].Proc of the th Annual Com-puter Security Applications Conference.2004
  • 7Levine J,Grizzard J,Owen H.Detecting and Categorizing Ker-nel-Level Rootkits to AidFuture Detection[].IEEE Security&Privacy.2006

同被引文献3

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部