The focus of this study was to identify, analyze, compare, and evaluate the effectiveness of rootkit detection methodologies. Specifically, two methodologies were studied in depth. The first is the heuristic of statically analyzing kernel module binaries, which attempts to determine whether or not a software module's behavior is malicious, prior to passing it to the operating system. The second methodology analyzed in this paper, the Strider Ghostbuster framework, compares what a computer system believes to be true (i.e., what modules are visible to the OS) to the absolute “truth,” which is determined via low-level system programming. The expected results of this comparison should always be equal, unless a malicious tampering on the system is observed. After comparing the effectiveness of detection methodologies on a set of well-known (and publicly available) rootkits, including a very simple rootkit built by the author, the methodologies are compared and their effectiveness is evaluated.
Le informazioni nella sezione "Riassunto" possono far riferimento a edizioni diverse di questo titolo.
Eugene Chuvyrov is an independent software consultant in the beautiful Jacksonville, Florida. His specializes in enterprise and mobile software development.
Le informazioni nella sezione "Su questo libro" possono far riferimento a edizioni diverse di questo titolo.
Da: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Germania
Taschenbuch. Condizione: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -The focus of this study was to identify, analyze, compare, and evaluate the effectiveness of rootkit detection methodologies. Specifically, two methodologies were studied in depth. The first is the heuristic of statically analyzing kernel module binaries, which attempts to determine whether or not a software module's behavior is malicious, prior to passing it to the operating system. The second methodology analyzed in this paper, the Strider Ghostbuster framework, compares what a computer system believes to be true (i.e., what modules are visible to the OS) to the absolute truth, which is determined via low-level system programming. The expected results of this comparison should always be equal, unless a malicious tampering on the system is observed. After comparing the effectiveness of detection methodologies on a set of well-known (and publicly available) rootkits, including a very simple rootkit built by the author, the methodologies are compared and their effectiveness is evaluated. 116 pp. Englisch. Codice articolo 9783844384833
Quantità: 2 disponibili
Da: moluna, Greven, Germania
Condizione: New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. Autor/Autorin: Chuvyrov EugeneEugene Chuvyrov is an independent software consultant in the beautiful Jacksonville, Florida. His specializes in enterprise and mobile software development.The focus of this study was to identify, analyze, compa. Codice articolo 5476003
Quantità: Più di 20 disponibili
Da: buchversandmimpf2000, Emtmannsberg, BAYE, Germania
Taschenbuch. Condizione: Neu. This item is printed on demand - Print on Demand Titel. Neuware -The focus of this study was to identify, analyze, compare, and evaluate the effectiveness of rootkit detection methodologies. Specifically, two methodologies were studied in depth. The first is the heuristic of statically analyzing kernel module binaries, which attempts to determine whether or not a software module's behavior is malicious, prior to passing it to the operating system. The second methodology analyzed in this paper, the Strider Ghostbuster framework, compares what a computer system believes to be true (i.e., what modules are visible to the OS) to the absolute 'truth,' which is determined via low-level system programming. The expected results of this comparison should always be equal, unless a malicious tampering on the system is observed. After comparing the effectiveness of detection methodologies on a set of well-known (and publicly available) rootkits, including a very simple rootkit built by the author, the methodologies are compared and their effectiveness is evaluated.VDM Verlag, Dudweiler Landstraße 99, 66123 Saarbrücken 116 pp. Englisch. Codice articolo 9783844384833
Quantità: 1 disponibili
Da: AHA-BUCH GmbH, Einbeck, Germania
Taschenbuch. Condizione: Neu. nach der Bestellung gedruckt Neuware - Printed after ordering - The focus of this study was to identify, analyze, compare, and evaluate the effectiveness of rootkit detection methodologies. Specifically, two methodologies were studied in depth. The first is the heuristic of statically analyzing kernel module binaries, which attempts to determine whether or not a software module's behavior is malicious, prior to passing it to the operating system. The second methodology analyzed in this paper, the Strider Ghostbuster framework, compares what a computer system believes to be true (i.e., what modules are visible to the OS) to the absolute truth, which is determined via low-level system programming. The expected results of this comparison should always be equal, unless a malicious tampering on the system is observed. After comparing the effectiveness of detection methodologies on a set of well-known (and publicly available) rootkits, including a very simple rootkit built by the author, the methodologies are compared and their effectiveness is evaluated. Codice articolo 9783844384833
Quantità: 1 disponibili
Da: preigu, Osnabrück, Germania
Taschenbuch. Condizione: Neu. Analysis of Automated Rootkit Detection Methodologies | ANALYSIS, COMPARISON, AND EVALUATION OF THE EFFECTIVENESS OF ROOTKIT DETECTION METHODOLOGIES | Eugene Chuvyrov | Taschenbuch | 116 S. | Englisch | 2011 | LAP LAMBERT Academic Publishing | EAN 9783844384833 | Verantwortliche Person für die EU: BoD - Books on Demand, In de Tarpen 42, 22848 Norderstedt, info[at]bod[dot]de | Anbieter: preigu. Codice articolo 106943194
Quantità: 5 disponibili
Da: Buchpark, Trebbin, Germania
Condizione: Sehr gut. Zustand: Sehr gut | Sprache: Englisch | Produktart: Bücher | The focus of this study was to identify, analyze, compare, and evaluate the effectiveness of rootkit detection methodologies. Specifically, two methodologies were studied in depth. The first is the heuristic of statically analyzing kernel module binaries, which attempts to determine whether or not a software module's behavior is malicious, prior to passing it to the operating system. The second methodology analyzed in this paper, the Strider Ghostbuster framework, compares what a computer system believes to be true (i.e., what modules are visible to the OS) to the absolute ¿truth,¿ which is determined via low-level system programming. The expected results of this comparison should always be equal, unless a malicious tampering on the system is observed. After comparing the effectiveness of detection methodologies on a set of well-known (and publicly available) rootkits, including a very simple rootkit built by the author, the methodologies are compared and their effectiveness is evaluated. Codice articolo 10805203/2
Quantità: 1 disponibili