Survey on botnet detection techniques

R Mishra, SK Jha - Internet of Things and Its Applications: Select …, 2022 - Springer
Due to unpleasant market competition, IT companies are releasing the software or
applications without much considering the unintended security breaches presented inside it …

Effectiveness of linux rootkit detection tools

J Junnila - 2020 - oulurepo.oulu.fi
Rootkits—a type of software that specializes in hiding entities in computer systems while
enabling continuous control or access to it—are particularly difficult to detect compared to …

Uncloaking rootkits on mobile devices with a hypervisor-based detector

J Vetter, M Junker-Petschick, J Nordholz… - Information Security and …, 2016 - Springer
Cell phones have evolved into general purpose computing devices, which are tightly
integrated into many IT infrastructures. As such, they provide a potential malware entry point …

[HTML][HTML] Rootkit 攻防机制与实现方法

李馥娟, 王群 - 电信科学, 2018 - infocomm-journal.com
Rootkit 是一类能够攻击系统内核且实现深度隐藏的恶意代码, 已对网络安全造成了严重威胁.
首先, 介绍了Rootkit/Bootkit 的基本特征, 对比分析了用户模式和内核模式下Rootkit 攻击的特点; …

VMI based automated real-time malware detector for virtualized cloud environment

MA Ajay Kumara, CD Jaidhar - International Conference on Security …, 2016 - Springer
Abstract The Virtual Machine Introspection (VMI) has evolved as a promising future security
solution to performs an indirect investigation of the untrustworthy Guest Virtual Machine …

[PDF][PDF] A behavior-based Kernel Level Authentication Mechanism for Protecting System Services Against Malicious Code Attacks

K Muthumanickam - 2016 - dspace.pondiuni.edu.in
Computer security has long been subjected to protect either an important endsystem or an
entire network of hosts. Despite the latest advances in safeguarding the security of end …