期刊文献+

基于劫持内核入口点的隐藏进程检测方法 被引量:3

Hidden Process Detection Method Based on Intercepting the Entry of System Kernel
下载PDF
导出
摘要 针对现有的隐藏进程检测方法存在易规避、兼容性差、对操作系统性能影响较大等问题,提出了一种基于劫持内核入口点的隐藏进程检测方法.该方法根据进程与内核交互的行为特征,劫持用户态进入内核态的3类入口:KiFastCallEntry、IDT和GDT,通过语义重构建立内核态进程列表,结合交叉视图检测隐藏进程.实验表明,与其他进程检测方法相比,该方法可以检测目前各种Rootkit隐藏进程方法;支持多种Windows操作系统版本,且对操作系统的性能影响较小;准确性高,兼容性好,实用价值高. At present,hidden process detection methods are avoidable,poor compatibility or high wastage.A method based on intercepting the entry of system kernel was proposed to solve these problems.The method applies the process behavior of communicating with system kernel to intercept the three channels:KiFastCallEntry,IDT and GDT,which were from user layer to kernel layer.Furthermore,the method applied the semantic reconstruction to establish the process list of kernel layer,and then combined with cross-view to detect hidden processes.The experiments show that the method proposed in this paper can detect all kinds of hidden processes at present.The method can be used in the majority of Windows operating system and it has higher detection accuracy,better compatibility,lower wastage and stronger pragmatic value.
出处 《北京理工大学学报》 EI CAS CSCD 北大核心 2015年第5期545-550,共6页 Transactions of Beijing Institute of Technology
基金 北京理工大学科技创新计划重大项目(2011CX01015) 国家"二四二"计划项目(2005C48)
关键词 隐藏进程检测 交叉视图 ROOTKIT 隐藏进程 hidden process detection cross-view Rootkit hidden process
  • 相关文献

参考文献15

  • 1Hoglund G, Butler J. Rootkits: subverting the Windows kernel[M]. California: Addison Wesley Pro-fessional, 2005.
  • 2白光冬,郭耀,陈向群.一种基于交叉视图的Windows Rootkit检测方法[J].计算机科学,2009,36(8):133-137. 被引量:13
  • 3Fu Desheng. A Windows Rootkit detection method based on cross-view[C]//Proceedings of E-Product E- Service and E-Entertainment. FIenan, China.. ICEEE, 2010 : 1 - 3.
  • 4Ying W, Chunming H, Bo L. VMDetector: a VMM- based platform to detect hidden process by multi-view comparison [ C ] // Proceedings of High-Assurance Systems Engineering. Los Alamitos, USA: IEEE Computer Society, 2011:307 - 312.
  • 5Bill Blunden. The rootkit arsenal escape and evasion in the clark corners of the system[M], [S. 1. ] : Wordware Publishing, Inc, 2012.
  • 6Jie H, Yu-Jie H, Zhi-Jian D, et al. A methodology to detect kernel level rootkits based on detecting hidden processes[C]//Proceedings of Apperceiving Computing and Intelligence Analysis. Piscataway, USA: IEEE, 2008:359 - 361.
  • 7Zhang C, Lin X, Lin S, et al. Study of handles mechanism in WRK [C] /// Proceedings of Information Technology and Computer Science Kiev. Ukraine.. IEEE Computer Society, 2010: 543 - 547.
  • 8Zhu J, Zhou T, Wang Q. Towards a novel approach for hidden process detection based on physical memory scanning[C]//Proceedings of Multimedia Information Networking and Security. Nanjing, Jiangsu, China: IEEE Computer Society, 2012:662- 665.
  • 9何志,范明钰.基于HSC的进程隐藏检测技术[J].计算机应用,2008,28(7):1772-1775. 被引量:8
  • 10Pu W, Yu J, Chang J, et al. A method for hidden process detection based on routines of thread scheduling list [ C ] // Proceedings of Internet Technology and Application. Piscataway, NJ, USA: IEEE, 2010:1 - 5.

二级参考文献56

  • 1李伟,苏璞睿.基于内核驱动的恶意代码动态检测技术[J].中国科学院研究生院学报,2010,27(5):695-703. 被引量:9
  • 2CERT Advisory CA- 1994-01 Ongoing Network Monitoring Attacks[OL]. http://www. cert. org/advisories/CA-1994-01. html.
  • 3Rutkowska J. Subverting Vista^TM Kernel For Fun And Profit [J]. Blaekhat Presentation,August 2006.
  • 4Uty.搜索内存枚举进程[OL].http://blog.donews.com/uuty/archive/2006/03/15/769472.aspx.
  • 5Wiki[OL]. http://en.wikipedia.org/wiki/Rootkit.
  • 6King S T,Chen P M. SubVirt: Implementing malware with virtual machines[C]// Security and Privacy, IEEE Symposium. 2006.
  • 7Heasman J. Implementing and Detecting an ACPI Rootkit[M]. BlackHat Federal, 2006.
  • 8Heasman J. Implementing and Detecting a PCI Rootkit[M]. November 2006.
  • 9Hoglund G,Butler J. Rootkits.. Subverting the windows kernel. 2007.
  • 10FUrootkit[OL]. http://www. rootkit. com/vault/fuzen_op/ FU_Rootkit. zip.

共引文献26

同被引文献14

引证文献3

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部