DocumentCode :
3106297
Title :
Analysis and Research on Hidden Technology Based on Kernel-Level Rootkit Process
Author :
Lu Zeyong ; Gan Gang ; Jiang Jun
Author_Institution :
Network Eng. Coll., Chengdu Univ. of Inf. Technol., Chengdu, China
fYear :
2011
fDate :
16-18 Aug. 2011
Firstpage :
1
Lastpage :
4
Abstract :
Trojan technology not only the most common and the most effective attack mean in network, but also an important approach in intercepted network information. The effective hidden which directly determine the survival of Trojans is the key for success implant Trojan. This paper first analysis the principle of Rootkit, researching the Windows kernel-level Trojan´s hidden technologies further, and to build a dynamic process model framework basis on it.
Keywords :
authorisation; invasive software; Trojan technology; dynamic process model framework; hidden technology; intercepted network information; kernel-level Rootkit process; Collaboration; Computational modeling; Computers; Indexes; Kernel; Process control; Trojan horses;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Internet Technology and Applications (iTAP), 2011 International Conference on
Conference_Location :
Wuhan
Print_ISBN :
978-1-4244-7253-6
Type :
conf
DOI :
10.1109/ITAP.2011.6006309
Filename :
6006309
Link To Document :
بازگشت