Defense of hidden backdoor technology for Web
Rootkit is a set of persistent and undetectable attack technologies,which can hide their attack behavior and backdoor trace by modifying software or kernel in operating system and changing execution path of instruction.Firstly,the basic definition and evolution of Rootkit were introduced,then the op...
Saved in:
Main Authors: | , , , , |
---|---|
Format: | Article |
Language: | zho |
Published: |
Beijing Xintong Media Co., Ltd
2020-05-01
|
Series: | Dianxin kexue |
Subjects: | |
Online Access: | http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2020142/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841530677437136896 |
---|---|
author | Liyue CHEN Xin SUN Tiansheng CHENG Chunming WU Shuangxi CHEN |
author_facet | Liyue CHEN Xin SUN Tiansheng CHENG Chunming WU Shuangxi CHEN |
author_sort | Liyue CHEN |
collection | DOAJ |
description | Rootkit is a set of persistent and undetectable attack technologies,which can hide their attack behavior and backdoor trace by modifying software or kernel in operating system and changing execution path of instruction.Firstly,the basic definition and evolution of Rootkit were introduced,then the operating principle,current mainstream technology and detection methods of Rootkit were discussed.Then,through comparative experiments on performance and security,the application of mimic defense system was described for Web based on dynamic,heterogeneous,redundant structure under Trojan Horse attack.Experiments show that mimic defense system can effectively defend against Trojan Horse in tests in the premise of low overhead.At last,the opportunities and challenges of the DHR system were summarized. |
format | Article |
id | doaj-art-796799be7ed84aa38447e0af15f1345e |
institution | Kabale University |
issn | 1000-0801 |
language | zho |
publishDate | 2020-05-01 |
publisher | Beijing Xintong Media Co., Ltd |
record_format | Article |
series | Dianxin kexue |
spelling | doaj-art-796799be7ed84aa38447e0af15f1345e2025-01-15T03:00:42ZzhoBeijing Xintong Media Co., LtdDianxin kexue1000-08012020-05-0136394659583061Defense of hidden backdoor technology for WebLiyue CHENXin SUNTiansheng CHENGChunming WUShuangxi CHENRootkit is a set of persistent and undetectable attack technologies,which can hide their attack behavior and backdoor trace by modifying software or kernel in operating system and changing execution path of instruction.Firstly,the basic definition and evolution of Rootkit were introduced,then the operating principle,current mainstream technology and detection methods of Rootkit were discussed.Then,through comparative experiments on performance and security,the application of mimic defense system was described for Web based on dynamic,heterogeneous,redundant structure under Trojan Horse attack.Experiments show that mimic defense system can effectively defend against Trojan Horse in tests in the premise of low overhead.At last,the opportunities and challenges of the DHR system were summarized.http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2020142/Rootkitdynamic heterogeneous redundant structuremimic defense |
spellingShingle | Liyue CHEN Xin SUN Tiansheng CHENG Chunming WU Shuangxi CHEN Defense of hidden backdoor technology for Web Dianxin kexue Rootkit dynamic heterogeneous redundant structure mimic defense |
title | Defense of hidden backdoor technology for Web |
title_full | Defense of hidden backdoor technology for Web |
title_fullStr | Defense of hidden backdoor technology for Web |
title_full_unstemmed | Defense of hidden backdoor technology for Web |
title_short | Defense of hidden backdoor technology for Web |
title_sort | defense of hidden backdoor technology for web |
topic | Rootkit dynamic heterogeneous redundant structure mimic defense |
url | http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2020142/ |
work_keys_str_mv | AT liyuechen defenseofhiddenbackdoortechnologyforweb AT xinsun defenseofhiddenbackdoortechnologyforweb AT tianshengcheng defenseofhiddenbackdoortechnologyforweb AT chunmingwu defenseofhiddenbackdoortechnologyforweb AT shuangxichen defenseofhiddenbackdoortechnologyforweb |