Mechanism and implementation of Rootkit attack and defense

Rootkit is a set of malicious codes that can attack the system kernel and achieve deep hiding,which has posed serious threats to cyber security.Firstly,the basic features of Rootkit/Bootkit were introduced,and the characteristics of Rootkit attacks in user mode and kernel mode were compared and anal...

Full description

Saved in:
Bibliographic Details
Main Authors: Fujuan LI, Qun WANG
Format: Article
Language:zho
Published: Beijing Xintong Media Co., Ltd 2018-12-01
Series:Dianxin kexue
Subjects:
Online Access:http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2018298/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841530489280659456
author Fujuan LI
Qun WANG
author_facet Fujuan LI
Qun WANG
author_sort Fujuan LI
collection DOAJ
description Rootkit is a set of malicious codes that can attack the system kernel and achieve deep hiding,which has posed serious threats to cyber security.Firstly,the basic features of Rootkit/Bootkit were introduced,and the characteristics of Rootkit attacks in user mode and kernel mode were compared and analyzed.Thereafter,the implementation principles and working mechanisms of Hook,DKOM and virtualization technologies involved in Rootkit attacks were emphatically analyzed.Combined with the specific attack behaviors,the main detection methods and defense techniques for Rootkit attacks were discussed at the end.
format Article
id doaj-art-f35bed14a2d44d51939e29ea7e06c14c
institution Kabale University
issn 1000-0801
language zho
publishDate 2018-12-01
publisher Beijing Xintong Media Co., Ltd
record_format Article
series Dianxin kexue
spelling doaj-art-f35bed14a2d44d51939e29ea7e06c14c2025-01-15T03:03:35ZzhoBeijing Xintong Media Co., LtdDianxin kexue1000-08012018-12-0134334559592306Mechanism and implementation of Rootkit attack and defenseFujuan LIQun WANGRootkit is a set of malicious codes that can attack the system kernel and achieve deep hiding,which has posed serious threats to cyber security.Firstly,the basic features of Rootkit/Bootkit were introduced,and the characteristics of Rootkit attacks in user mode and kernel mode were compared and analyzed.Thereafter,the implementation principles and working mechanisms of Hook,DKOM and virtualization technologies involved in Rootkit attacks were emphatically analyzed.Combined with the specific attack behaviors,the main detection methods and defense techniques for Rootkit attacks were discussed at the end.http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2018298/network attack and defensemalwareRootkithooking attacknetwork security
spellingShingle Fujuan LI
Qun WANG
Mechanism and implementation of Rootkit attack and defense
Dianxin kexue
network attack and defense
malware
Rootkit
hooking attack
network security
title Mechanism and implementation of Rootkit attack and defense
title_full Mechanism and implementation of Rootkit attack and defense
title_fullStr Mechanism and implementation of Rootkit attack and defense
title_full_unstemmed Mechanism and implementation of Rootkit attack and defense
title_short Mechanism and implementation of Rootkit attack and defense
title_sort mechanism and implementation of rootkit attack and defense
topic network attack and defense
malware
Rootkit
hooking attack
network security
url http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2018298/
work_keys_str_mv AT fujuanli mechanismandimplementationofrootkitattackanddefense
AT qunwang mechanismandimplementationofrootkitattackanddefense