期刊文献+

针对改进型Rootkit的检测系统设计

Design of Detection Systems for Improved Rootkits
下载PDF
导出
摘要 为了有效的检测改进型Rootkit,设计了一种基于优先启动的行为分析检测系统。该系统采用了基于权值系数的智能化行为分析技术,并采用优先启动技术弥补了行为分析技术中探针部署容易受到影响的缺陷。另外,系统在执行路径和总线上阻止Rootkit的非常规加载;设计了报表生成模块以与其它检测软件共享检测信息;采用了文件与进程双重保护以避免Rootkit的破坏。系统对改进型Rootkit具有较好的检测效果,对相关检测软件的设计有较高的参考价值。 In order to detect improved Rootkits effectively,a behavior analysis detection system is designed based on priority starting.This system employes intelligent behavior analysis based on weight coefficients,and uses priority starting to compensate for the flimsiness of probe deployment in behavior analysis.This system stops unconventional Rootkit loading on the bus and execution path.A reporting generation module is designed to share monitoring information with other detection software,and a double protection of documents and processes is used to prevent damage by Rootkits.This system can effectively detect improved Rootkits and is of high reference value to designing other detection software.
出处 《信息工程大学学报》 2011年第5期634-640,共7页 Journal of Information Engineering University
基金 河南省重点科技攻关项目(082102210097)
关键词 行为分析系统 探针部署 优先启动 非常规加载 behavior analysis system probe deployment priority starting unconventional loading
  • 相关文献

参考文献10

  • 1Yulin WANG, Yang SHEN, Jian PAN. Usage Control Based on Windows Kernel Hook [ C ]//2009 International Conference on Information and Multimedia Technology. 2009:264-267. 被引量:1
  • 2Grey Hoglund. Loading Rootkit using SystemLoadAndCalllmage~ EB/OL]. [ 2000-08-29 ]. http://seclists, org/bugtraq/2000/ aug/408. 被引量:1
  • 3字文.MigBot代码补丁技术的源代码过程讲解[EB/OL].[2008-06—11].http://www.51cto.com/atr/200808/76358.htm. 被引量:1
  • 4Mj0011.高级Bootkit:Tophet.a[J/OL].[2009-01-30].http://www.hackbase.com/tech/2009-01.30/43503—1.html. 被引量:1
  • 5Mark Russinovich. Inside Windows 7 User Account Control [ EB/OL ]. [ 2009-07-01 ]. http://technet, microsoft, com/en-us/ magazine/2009.07, uac. aspx. 被引量:1
  • 6李月峰.基于行为监测的Anti-R/Bootkit的研究与实现[D].合肥:中国科学技术大学,2009:6—7. 被引量:1
  • 7Greg Hoglund ,James Butler. Rootkits :Subverting the Windows Kernel[ M ]. Massachusetts:Addison Wesley Professional ,2005: 3,74-87,173-183,210-214. 被引量:1
  • 8Mark E Russinovich,David A Solomon. Microsoft Windows Internals( Foutrh Edition)[ M 1. Beijing: Publishing House of Elec- tronics industry ,2007:423-424,694-696,584. 被引量:1
  • 9林蔚..MD5安全性分析[D].北京邮电大学,2009:
  • 10贺鹏程,王劲林,邓浩江,孙鹏.P2P文件完整性校验延迟隐藏算法[J].计算机工程,2010,36(15):29-31. 被引量:4

二级参考文献6

  • 1Cai Zhuhua,Chen Ruichuan,Feng Jiangqiao,et al.A Holistic Mechanism Against File Pollution in Peer-to-Peer Networks[C]// Proc.of 2009 ACM Symposium on Applied Computing.New York,NY,USA:ACM Press,2009:28-34. 被引量:1
  • 2Yoram K D B.The eMule Protocol Specification[EB/OL].(2005-09-05).http://www.cs.huji.ac.il/labs/danss/presentations/emule.pdf. 被引量:1
  • 3Cohen B.The BitTorrent Protocol Specification[EB/OL].(2009-03-18).http://www.bittorrent.org/beps/bep_0003.html. 被引量:1
  • 4Rivest R.The MD4 Message-digest Algorithm[S].RFC 1320,1992. 被引量:1
  • 5Eastlake E.US Secure Hash Algorithm 1(SHA1)[S].RFC 3174,2001. 被引量:1
  • 6Habib A,Xu Dongyan,Atallah M J,et al.Verifying Data Integrity in Peer-to-Peer Media Streaming[C]//Proc.of the 12th Annual Conference on Multimedia Computing and Networking.San Jose,CA,USA:[s.n.],2005:1-12. 被引量:1

共引文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部