期刊文献+

基于Kprobe的Rootkit检测机制 被引量:1

Rootkit detection based on Kprobe
下载PDF
导出
摘要 对现有Linux系统下Rootkit检测技术的原理进行分析,并提出了基于Kprobe的Rootkit检测技术。通过在关键路径下插入探测点,在内核底层收集Rootkit所要隐藏的对象信息,最后通过底层收集的信息与系统中审计工具所得的结果进行交叉视图的比对得到被隐藏对象。在实验阶段选择几种现有流行的Rootkit安装,采用了基于Kprobe的检测方法,通过实验结果表明该机制具有良好的可靠性。 This paper analyzes the principles of the existing Rootkit detection technology on Linux system, and further proposes a detection technology using Kprobe. The detection method collects the information of objects hidden by Rootkit by inserting probe points into the critical path in low-level kernel, and then compares the underlying information and the results from audit tools with cross-view validation principle to get the hided objects. The experiments are conducted to verify this detection method on several popular Rootkits. The results show that this technique has a good reliability.
出处 《计算机工程与应用》 CSCD 北大核心 2016年第7期127-131,共5页 Computer Engineering and Applications
基金 国家自然科学青年基金(No.61202060)
关键词 ROOTKIT检测 Kprobe 内核 审计工具 交叉视图比对 Rootkit detection Kprobe kernel audit tool cross-view vaildation
  • 相关文献

参考文献14

  • 1辛知,陈惠宇,韩浩,茅兵,谢立.基于结构体随机化的内核Rootkit防御技术[J].计算机学报,2014,37(5):1100-1110. 被引量:7
  • 2Rhee J,Riley R,Xu D,et al.Defeating dynamic data kernel rootkit attacks via VMM-based guest-transparent monitoring[C]//Proceedings of the 4th IEEE Conference on Availability,Reliability and Security(ARES),Fukuoka,Japan,2009.
  • 3Jones S T,Arpaci-Dusseau A C,Arpaci-Dusseau R H.VMM-based hidden process detection and identification using Lycosid[C]//Proceedings of the 4th ACM Sigplan/Sigops International Conference on Virtual Execution Environments,2008.
  • 4Jiang X,Wang X,Xu D.Stealthy malware detection through vmm-based out-of-the-box semantic view reconstruction[C]//Proceedings of the 14th ACM Conference on Computer and Communications Security(CCS),Virginia,USA,2007.
  • 5FuS ys.Kernel security therapy anti-trolls[CP/OL].[2015-08-30].http://www.s0ftpj.org/tools/kstat24_v1.1-2.tgz.
  • 6Liang B,You W,Shi W,et al.Detecting stealthy malware with inter-structure and imported sig-natures[C]//Proceedings of ASIACCS,Hong Kong,China,Mar,2011.
  • 7Baliga A,Ganapathy V,Iftode L.Detecting kernel-level Rootkits using data structure invariants[J].IEEE Transactions on Dependable&Secure Computing,2010,8(5):670-684.
  • 8Keniston J,Panchamukhi P S.Kernel Probes[EB/OL].[2015-08-30].https://www.kernel.org/doc/Documentation/kprobes.txt.
  • 9Mavinakayanahalli A,Panchamukhi P,Keniston J,et al.Probing the guts of Kprobes[C]//Proceedings of Linux Symposium,2006.
  • 10Zanussi T,Yaghmour K,Wisniewski R W,et al.An efficient unified approach for trasmitting data from kernel to user space[C]//Proceedings of the Ottawa Linux Symposium,2003.

二级参考文献26

  • 1sd devik. Linux on-the-fly kernel patching without LKM.SucKIT source code,Phrack 58,2001.
  • 2kad. Handling Interrupt Descriptor Table for fun and profit.Phrack 59,2002.
  • 3IA-32 Intel Architecture Software Developer's Manual.www.intel.com,2001.
  • 4palmers. Sub proc_root Quando Sumus(Advances in Kernel Hacking).prrf source code,Phrack 58,2001.
  • 5Brumley D. Invisible intruders: Rootkits in practice. The USENIX Association Newsletter, 1999.
  • 6KrAugel C, Robertson W K, Vigna G. Detecting kernel- level rootkits through binary analysis//Proceedings of the 20th Annual Computer Security Applications Conference. Washington, USA, 2004:91-100.
  • 7Baliga A, Ganapathy V, Iftode L. Automatic inference and enforcement of kernel data structure invariants//Proceedings of the 2008 Annual Computer Security Applications Conference. Washington, USA, 2008:77-86.
  • 8Petroni Jr N L, Fraser T, Walters A, Arbaugh W A. An architecture for specification-based detection of semantic integrity violations in kernel dynamic data//Proceedings of the 15th Conference on USENIX Security Symposium. Berkeley, USA, 2006:289-304.
  • 9Petroni Jr N L, Hicks M. Automated detection of persistent kernel control flow attacks//Proeeedings of the 14th ACM Conference on Computer and Communications Security. Chicago, USA, 2007: 103-115.
  • 10Baliga A, Kamat P, Iftode L. Lurking in the shadows: Identifying systemic threats to kernel data//Proceedings of the 2007 IEEE Symposium on Security and Privacy. Washington, USA, 2007:246-251.

共引文献207

同被引文献5

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部