Detecting the Rootkit through Dynamic Analysis

Journal Title: UNKNOWN - Year 2015, Vol 4, Issue 3

Abstract

Network security provides a security for all the programs or files or system. Some attackers attack a programs or files or passwords or other personal details of the user. Like the same way Rootkit is one of the malicious file or a software which attacks a network security and acts an administrator in an absence of the user knowledge. Rootkit virus is stealthy in nature and is installed in the system through a file or a driver or coding. It attacks the system through the kernel-level in the real time. Files are hided through the rootkit in the absence of the user knowledge. They can monitor the other user’s activity when the botnet is installed in the other system. Rootkit allows the attacker through the backdoor. So that attacker can steal the users personal details. Task manager, service and the registry are got destroyed or made changes. The attacker can make any changes at any time. Finally the malicious file and authorized files are distinguished and their accuracy is performed.

Authors and Affiliations

Keywords

Related Articles

Effectiveness of Video Assisted Teaching Program Regarding Knowledge on Biomedical Waste Management among Staff Nurses

"ABSTRACT BACKGROUND: Biomedical waste has become serious health hazard in many countries, including India. Major issue related to current biomedical waste management in many hospitals is that some hospitals are disposi...

Synthesis, Characterization, Thermal, Refractive and Di Electric Studies of BIS (1-Oxododecyl) Peroxide Initiated Copolymers of Methacrylonitrile-Methyl Methacrylate

"ABSTRACT Copolymer of Methacrylonitrile (MAN) with Methyl methacrylate (MMA) was synthesized by free radical polymerization method by using bis (1-oxododecyl) peroxide as initiator in dimethylformamide (DMF) at...

Orbital Echinococcosis: A Case Report

"Echinococcosis is a zoonotic disease caused by the larval stage of the metacestode stage. Orbital echinococcosis predominantly caused by E.granulosus manifests as a unilocular cyst. Orbital involvement comprises 0.3% t...

Document Annotation Based on Query Workload, Content-Value and User Expectation Tracking Form

"Document Annotation means these are comments.Annotations are metadata, it give additional information about data.In olden days Form based query interfaces are used for accessing the databases but it has some limitations...

Mitigation of Global Warming Through Biological Carbon Sequestration Using Micro Algae

The world has been threatened due to the ongoing global warming and climate change due to the bulk discharge of anthropogenic green house gases into the atmosphere through the combustion of fossil fuels, automobile exhau...

Download PDF file
  • EP ID EP357523
  • DOI -
  • Views 83
  • Downloads 0

How To Cite

(2015). Detecting the Rootkit through Dynamic Analysis. UNKNOWN, 4(3), -. https://europub.co.uk/articles/-A-357523