版權(quán)說明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請(qǐng)進(jìn)行舉報(bào)或認(rèn)領(lǐng)
文檔簡介
1、R o o tk it R e s e a r c h B a s e d o n W in d o w sN T 6 .x 's S ecu rity C h a ra cteristic sA D is s e r t a t io n S u b m it t e d t oN a n jin g N o r m a lU n iv e rsityF o r th e A ca d e m ic D eg re
2、 e o f M a ste r o f E n g in e e rin gB YL iB ic h o n gS u p erv ise d b yA s s o c ia t e P r o f .C h e n B oS ch o o lo f C o m p u te r S c ie n c e a n d T ec h n o lo g yN a n jin g N o r m a lU n iv e rsityM a
3、y 2 0 12A b stra c tA b s tra c tW i t h t he rap i d developm entof t he I nternet,netw ork securi t y issues have becom e i n?creasi ngl y prom i nent.M i crosofthasrel eased t he new estoperati ng syst em i n order
4、 t o en?hance conti nuousl y sel f-securi ty protect i on agai nst vari eti es of att ack.M eanw hil e,t hem al w are program producers al so m anage t o f ind t he vul nerabl i l i ti es i n the securi ty featur
5、esof t he new ly rel eased operati ng system to at tack i t.R oot ki tt echnol ogy i s a group of backdoor t ool s of Trojan H orses w hi ch can be u sedt o m odi fy the existi ng operati on syst em to h
6、el p at t ackers disgui se t hem sel ves and access t ot he operation system .H ow ever,R oot ki t i t sel f is notm alevol ent.F or exam pl e,th ere are af ew l egalsof t w ares w hi ch have advanced feat ures such
7、as ant i vi rus soft w are had usedsom e R ootki tt echnol ogi es t o st ay i n t he bot t om of t he operat i ng system i n order t o findm ore m al w are at t acks.T he R ooki tt echnol ogy w i l lbe m al evol enti
8、f i tw as used by m al -w ares such as vi rus and T rojans.A m ong t he operat i ng syst em s rel eased by M i crosoftC or porat i on,W i ndow s X P i s t hem ostpopul ar and w i despread operat i ng system ver
9、si on.M eanw hi l e i ti s t he m ai n t argetat t acked by t he m al w are progr am .T he new l y rel eased N T 6. x operati ng syst em seri es haveadopt ed som e new securi t y feat ures such asU ser A c
10、countC ont rol ,D ri ver D i gi t alSi gaturew hi ch have caused som e at tack m et hods i nval i d.A tt he sam e t i m e m any new at t ack m e-t odsare produced.The key poi ntof m y research t hesi s i s m ai
11、nl y aboutt he survi vi ng envi ?ronm entand det ect i ng m et hods of t radi t i onalR oot ki ti n t he new securi t y N T 6. X plat formFi nal l y,a R oot ki tdet ect i ng t ooli s desi gned i n W i ndow s
12、N T 6. x pl atform .T he i m pl e?m ent at i on det ai l s of t he syst em desi gn sol ut i on and pi vot alm odul es are proposed .A seriesof uni tt est s and m odul e t est s are perf orm ed.The testresu
13、l t s t urn outt hatt he detect i ng tooli s abl e to detect t he com parat i vel y popupl ar R oot ki ti n W i ndow s N T 6. x pl atform .C om ?pari ng w i t h t he det ect i ng toolX urTr,our det ect i ng t oolhas
溫馨提示
- 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請(qǐng)下載最新的WinRAR軟件解壓。
- 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請(qǐng)聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
- 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁內(nèi)容里面會(huì)有圖紙預(yù)覽,若沒有圖紙預(yù)覽就沒有圖紙。
- 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
- 5. 眾賞文庫僅提供信息存儲(chǔ)空間,僅對(duì)用戶上傳內(nèi)容的表現(xiàn)方式做保護(hù)處理,對(duì)用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對(duì)任何下載內(nèi)容負(fù)責(zé)。
- 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請(qǐng)與我們聯(lián)系,我們立即糾正。
- 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時(shí)也不承擔(dān)用戶因使用這些下載資源對(duì)自己和他人造成任何形式的傷害或損失。
最新文檔
- windowsnt6.x系列操作系統(tǒng)下的rootkit技術(shù)研究與實(shí)現(xiàn)
- 基于windowsnt6.x環(huán)境下防火墻技術(shù)的研究與實(shí)現(xiàn)
- WindowsNT系統(tǒng)下動(dòng)態(tài)模擬環(huán)境.pdf
- Windows下Rootkit啟動(dòng)技術(shù)的研究與應(yīng)用.pdf
- Linux下VFS層ROOTKIT技術(shù)研究.pdf
- 針對(duì)Windows RootKit的安全監(jiān)測(cè)系統(tǒng)的研究與實(shí)現(xiàn).pdf
- WindowsNT系統(tǒng)下多任務(wù)間進(jìn)程通訊的研究和模擬.pdf
- WindowsNT遠(yuǎn)程訪問安全策略研究及實(shí)現(xiàn).pdf
- Linux下內(nèi)核級(jí)Rootkit檢測(cè)防護(hù)機(jī)制的研究.pdf
- LINUX操作系統(tǒng)下ROOTKIT檢測(cè)技術(shù)研究.pdf
- Rootkit與Anti-Rootkit軟件的設(shè)計(jì)與實(shí)現(xiàn).pdf
- win32平臺(tái)下內(nèi)核rootkit技術(shù)的研究與應(yīng)用
- wm6.x下wcf分布式應(yīng)用的研究
- BIOS Rootkit及其檢測(cè)技術(shù)的研究.pdf
- WINDOWS ROOTKIT的檢測(cè)與清除研究.pdf
- Windows環(huán)境下針對(duì)Rootkit隱藏技術(shù)的木馬檢測(cè)技術(shù).pdf
- 鍵6x6x50.dwg
- 鍵6x6x50.dwg
- Windows Rootkit檢測(cè)機(jī)制的研究與實(shí)現(xiàn).pdf
- Win32平臺(tái)下內(nèi)核Rootkit技術(shù)的研究與應(yīng)用.pdf
評(píng)論
0/150
提交評(píng)論