Mechanism and implementation of Rootkit attack and defense
Rootkit is a set of malicious codes that can attack the system kernel and achieve deep hiding,which has posed serious threats to cyber security.Firstly,the basic features of Rootkit/Bootkit were introduced,and the characteristics of Rootkit attacks in user mode and kernel mode were compared and anal...
Saved in:
Main Authors: | Fujuan LI, Qun WANG |
---|---|
Format: | Article |
Language: | zho |
Published: |
Beijing Xintong Media Co., Ltd
2018-12-01
|
Series: | Dianxin kexue |
Subjects: | |
Online Access: | http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2018298/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Dynamic defense decision method for network real-time confrontation
by: Qiang LENG, et al.
Published: (2019-12-01) -
Survey on Byzantine attacks and defenses in federated learning
by: ZHAO Xiaojie, et al.
Published: (2024-12-01) -
Defense of hidden backdoor technology for Web
by: Liyue CHEN, et al.
Published: (2020-05-01) -
Research review of network defense decision-making methods based on attack and defense game
by: Xiaohu LIU, et al.
Published: (2022-02-01) -
Adversarial attacks and defenses in deep learning
by: Ximeng LIU, et al.
Published: (2020-10-01)