期刊文献+

Rootkit隐藏技术分析

Analysis Based on Technology of Rootkit Hidden
下载PDF
导出
摘要 目前网络安全应用的技术有很多,但是能够不被管理员发觉而悄无声息的收集数据的只有Rootkit。随着人们对Rootkit隐身技术的研究,它在网络安全中发挥的影响越来越大。本文分析Rootkit进程隐藏实现思想,给出了Rootkit实现隐藏进程的具体方法,为进一步研究Rootkti相关的木马病毒以及相应的木马病毒检测提供有效的帮助。 The current internet security technology has many applications, but only rootkit can collects data secretively which cannot be found by administrator. With the exploring of the hidden technology of rootkit, rootkit has an important impact on the field of internet' s security. This paper analyzes the example that how to conceal rootkit' s process, which points out the specific methods to achieve rootkit hidden process, providing effective help for our study to detect Trojan about rootkit.
作者 韩妍妍 张晓菲 刘培鹤 Han Yanyan Zhang Xiaofei Liu Peihe(Beijing Electronic Science and Technology Institute, Beijing 100070, China)
出处 《北京电子科技学院学报》 2016年第2期7-11,共5页 Journal of Beijing Electronic Science And Technology Institute
关键词 网络安全 ROOTKIT 隐藏进程 木马病毒 检测 internet security rootkit hidden process Trojan detect
  • 相关文献

参考文献3

二级参考文献30

  • 1张响亮,王伟,管晓宏.基于隐马尔可夫模型的程序行为异常检测[J].西安交通大学学报,2005,39(10):1056-1059. 被引量:16
  • 2Peisert S,Bishop M,Karin S,et al.Analysis of computer intrusions using sequences of function calls[J].IEEE Transactions on Dependable and Secure Computing,2007,4(2):137-150.
  • 3Christodorescu M,Jha S,Kruegel C.Mining specifications of malicious behavior[C] // Proceedings of the 1st India Software Engineering Conference.Hyderabad,India:ACM Press,2007:5-14.
  • 4Michael Bowman,Heath D.Brown,Paul Pitt.An undergraduate rootkit research project:How available? How hard? How dangerous?[EB/OL].Proceedings of the 4th Annual Conference on Information Security Curriculum Development.Kennesaw,Georgia:ACM Press,2007,article7:1-6.
  • 5Ye Y F,Wang D D,Li T,et al.IMDS:intelligent malware detection system[C] // Proceedings of the 13th International Conference on Knowledge Discovery and Data Mining.San Jose,California:ACM Press,2007:1 043-1 047.
  • 6Preda M D,Christodorescu M,Jha S,et al.A semantics-based approach to malware detection[C] // Proceedings of the 34th Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages.Nice,France:ACM Press,2007:377-388.
  • 7Yu Z,Tsai J J,Weigert T.An automatically tuning intrusion detection system[J].IEEE Transactions on Systems,Man,and Cybernetics-Part B:Cybernetics,2007,37(2):373-384.
  • 8Wang W,Guan X H,Zhang X L,et al.Profiling program behavior for anomaly intrusion detection based on the transition and frequency property of computer audit data[J].Computers & Security,2006,25(7):539-550.
  • 9Tan X B,Xi H S.Hidden semi-Markov model for anomaly detection[J].Applied Mathematics and Computation,2008,205(2):562-567.
  • 10Forrest S,Hofmeyr S A,Somayaji A,et al.A sense of self for unix process[C] // Proceedings of the IEEE Symposium on Security and Privacy.Oakland:IEEE Computer Society,1996:120-128.

共引文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部