...
首页> 外文期刊>Advanced Science Letters >Dual-Mode Kernel Rootkit Scan and Recovery with Process ID Brute-Force
【24h】

Dual-Mode Kernel Rootkit Scan and Recovery with Process ID Brute-Force

机译:双模内核rootkit扫描和恢复过程ID Brute-Force

获取原文
获取原文并翻译 | 示例

摘要

Rootkit is a malware that attacks a system continuously by hiding files, processes, and registries in a system. DKOM (Direct Kernel Object Manipulation) is a process hiding technique that manipulates a kernel object. AL-DKOM (All Link—Direct Kernel Object Manipulation) is an extendedversion of DKOM that manipulates all the modifiable links in the kernel object. It is difficult to detect with existing tools. This paper designed and implemented a new AL-DKOM detection system using dual-mode operation and PIDB-based process scan that was not possible with existing List Walkingmethod. In addition, we explain the recovery procedure of the infected system and flexible system management via process recovery that has not been tried before. We then show the performance of the new system by comparing and analyzing the effectiveness of the new system and existing rootkitscanning tools with real rootkit samples.
机译:rootkit是一种恶意软件,通过隐藏系统中的文件,进程和注册表持续攻击系统。 DKOM(直接内核对象操作)是一种操作内核对象的过程隐藏技术。 Al-DKOM(所有链路直接内核对象操作)是DKOM的扩展version,可以操纵内核对象中的所有可修改的链接。 使用现有工具难以检测。 本文设计并实现了一种使用双模操作和基于PIDB的过程扫描的新的AL-DKOM检测系统,即现有列表WalkingMethod是不可能的。 此外,我们通过以前未尝试的过程恢复解释受感染系统和灵活的系统管理的恢复过程。 然后,我们通过比较和分析新系统的有效性以及具有真正的rootkit样本的现有rootkitscanning工具的效力来展示新系统的性能。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号