Defense of hidden backdoor technology for Web

Rootkit is a set of persistent and undetectable attack technologies,which can hide their attack behavior and backdoor trace by modifying software or kernel in operating system and changing execution path of instruction.Firstly,the basic definition and evolution of Rootkit were introduced,then the op...

Full description

Saved in:
Bibliographic Details
Main Authors: Liyue CHEN, Xin SUN, Tiansheng CHENG, Chunming WU, Shuangxi CHEN
Format: Article
Language:zho
Published: Beijing Xintong Media Co., Ltd 2020-05-01
Series:Dianxin kexue
Subjects:
Online Access:http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2020142/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841530677437136896
author Liyue CHEN
Xin SUN
Tiansheng CHENG
Chunming WU
Shuangxi CHEN
author_facet Liyue CHEN
Xin SUN
Tiansheng CHENG
Chunming WU
Shuangxi CHEN
author_sort Liyue CHEN
collection DOAJ
description Rootkit is a set of persistent and undetectable attack technologies,which can hide their attack behavior and backdoor trace by modifying software or kernel in operating system and changing execution path of instruction.Firstly,the basic definition and evolution of Rootkit were introduced,then the operating principle,current mainstream technology and detection methods of Rootkit were discussed.Then,through comparative experiments on performance and security,the application of mimic defense system was described for Web based on dynamic,heterogeneous,redundant structure under Trojan Horse attack.Experiments show that mimic defense system can effectively defend against Trojan Horse in tests in the premise of low overhead.At last,the opportunities and challenges of the DHR system were summarized.
format Article
id doaj-art-796799be7ed84aa38447e0af15f1345e
institution Kabale University
issn 1000-0801
language zho
publishDate 2020-05-01
publisher Beijing Xintong Media Co., Ltd
record_format Article
series Dianxin kexue
spelling doaj-art-796799be7ed84aa38447e0af15f1345e2025-01-15T03:00:42ZzhoBeijing Xintong Media Co., LtdDianxin kexue1000-08012020-05-0136394659583061Defense of hidden backdoor technology for WebLiyue CHENXin SUNTiansheng CHENGChunming WUShuangxi CHENRootkit is a set of persistent and undetectable attack technologies,which can hide their attack behavior and backdoor trace by modifying software or kernel in operating system and changing execution path of instruction.Firstly,the basic definition and evolution of Rootkit were introduced,then the operating principle,current mainstream technology and detection methods of Rootkit were discussed.Then,through comparative experiments on performance and security,the application of mimic defense system was described for Web based on dynamic,heterogeneous,redundant structure under Trojan Horse attack.Experiments show that mimic defense system can effectively defend against Trojan Horse in tests in the premise of low overhead.At last,the opportunities and challenges of the DHR system were summarized.http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2020142/Rootkitdynamic heterogeneous redundant structuremimic defense
spellingShingle Liyue CHEN
Xin SUN
Tiansheng CHENG
Chunming WU
Shuangxi CHEN
Defense of hidden backdoor technology for Web
Dianxin kexue
Rootkit
dynamic heterogeneous redundant structure
mimic defense
title Defense of hidden backdoor technology for Web
title_full Defense of hidden backdoor technology for Web
title_fullStr Defense of hidden backdoor technology for Web
title_full_unstemmed Defense of hidden backdoor technology for Web
title_short Defense of hidden backdoor technology for Web
title_sort defense of hidden backdoor technology for web
topic Rootkit
dynamic heterogeneous redundant structure
mimic defense
url http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2020142/
work_keys_str_mv AT liyuechen defenseofhiddenbackdoortechnologyforweb
AT xinsun defenseofhiddenbackdoortechnologyforweb
AT tianshengcheng defenseofhiddenbackdoortechnologyforweb
AT chunmingwu defenseofhiddenbackdoortechnologyforweb
AT shuangxichen defenseofhiddenbackdoortechnologyforweb