Title :
Analysis and Research on Hidden Technology Based on Kernel-Level Rootkit Process
Author :
Lu Zeyong ; Gan Gang ; Jiang Jun
Author_Institution :
Network Eng. Coll., Chengdu Univ. of Inf. Technol., Chengdu, China
Abstract :
Trojan technology not only the most common and the most effective attack mean in network, but also an important approach in intercepted network information. The effective hidden which directly determine the survival of Trojans is the key for success implant Trojan. This paper first analysis the principle of Rootkit, researching the Windows kernel-level Trojan´s hidden technologies further, and to build a dynamic process model framework basis on it.
Keywords :
authorisation; invasive software; Trojan technology; dynamic process model framework; hidden technology; intercepted network information; kernel-level Rootkit process; Collaboration; Computational modeling; Computers; Indexes; Kernel; Process control; Trojan horses;
Conference_Titel :
Internet Technology and Applications (iTAP), 2011 International Conference on
Conference_Location :
Wuhan
Print_ISBN :
978-1-4244-7253-6
DOI :
10.1109/ITAP.2011.6006309