首页> 外文会议>Apperceiving Computing and Intelligence Analysis,ICACIA,2008 International Conference on >A Methodology to Detect Kernel Level Rootkits based on Detecting Hidden Processes
【24h】

A Methodology to Detect Kernel Level Rootkits based on Detecting Hidden Processes

机译:基于检测隐藏进程的内核级Rootkit检测方法

获取原文

摘要

Intruders will normally install some tools when he gains access to a computer system, in order to regain the root privilege when he come back onto the system at a later time. Installing a rookit on the compromised system is one of the methods that a intruder may use. The kernel of the operating system which is the lowest level of most modern OS will be modified by a kernel level rootkit. In this paper we present a standardized methodology to detect rootkits. Through this method, it is possible to provide additional protection against this type of malicious modification of the kernel.
机译:入侵者通常在获得对计算机系统的访问权限时会安装一些工具,以便稍后再次进入系统时重新获得root特权。在受感染的系统上安装新秀是入侵者可能使用的方法之一。操作系统级别的内核是现代操作系统中最低的级别,它将通过内核级别的rootkit进行修改。在本文中,我们提出了一种检测Rootkit的标准化方法。通过这种方法,可以提供针对这种类型的内核恶意修改的附加保护。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号