Detecting the Rootkit through Dynamic Analysis
Journal: International Journal of Science and Research (IJSR) (Vol.4, No. 3)Publication Date: 2015-03-05
Authors : D. Suganya Gandhi; S. Suresh Kumar;
Page : 1864-1868
Keywords : Malicious; Rootkit; Static analysis; Kernel-level;
Abstract
Network security provides a security for all the programs or files or system. Some attackers attack a programs or files or passwords or other personal details of the user. Like the same way Rootkit is one of the malicious file or a software which attacks a network security and acts an administrator in an absence of the user knowledge. Rootkit virus is stealthy in nature and is installed in the system through a file or a driver or coding. It attacks the system through the kernel-level in the real time. Files are hided through the rootkit in the absence of the user knowledge. They can monitor the other users activity when the botnet is installed in the other system. Rootkit allows the attacker through the backdoor. So that attacker can steal the users personal details. Task manager, service and the registry are got destroyed or made changes. The attacker can make any changes at any time. Finally the malicious file and authorized files are distinguished and their accuracy is performed.
Other Latest Articles
- Pop Culture - A Tool for Improving the Communicative Competence of the Students
- The Role of the Educational Television Programmes for the Proper Acquisition of the Macedonian Language with Elementary School Children
- Land Vehicle Tracking System
- Review on Floating Point Adder and Converter Units Using VHDL
- A Study of Carbimazole Treatment in Hyperthyroidism Comparsion with Radioiodine
Last modified: 2021-06-30 21:34:49