Detecting the Rootkit through Dynamic Analysis

Journal Title: International Journal of Science and Research (IJSR) - Year 2015, Vol 4, Issue 3

Abstract

Network security provides a security for all the programs or files or system. Some attackers attack a programs or files or passwords or other personal details of the user. Like the same way Rootkit is one of the malicious file or a software which attacks a network security and acts an administrator in an absence of the user knowledge. Rootkit virus is stealthy in nature and is installed in the system through a file or a driver or coding. It attacks the system through the kernel-level in the real time. Files are hided through the rootkit in the absence of the user knowledge. They can monitor the other user’s activity when the botnet is installed in the other system. Rootkit allows the attacker through the backdoor. So that attacker can steal the users personal details. Task manager, service and the registry are got destroyed or made changes. The attacker can make any changes at any time. Finally the malicious file and authorized files are distinguished and their accuracy is performed.

Authors and Affiliations

Keywords

Related Articles

A Survey Study of Anthropometric Characters of Malnourished Children of Slum Dwellers in Indore City

Malnutrition affects human performance, health and survival, including physical growth, morbidity, mortality, cognitive development, reproduction, physical work capacity and risks for several chronic diseases. In Madhya...

Nitrate Pollution of Aya Watershed in Vandeikya Rural Area of Benue State Nigeria

Nitrate Pollution of Aya Watershed in Vandeikya Rural Area of Benue State Nigeria

Relationship between Music Preference and Personality Type

"Abstract Music is universally omnipresent and in contemporary society, music is so pervasive that it is absolutely unavoidable. The deliberate access of FM radios in cars, iPods, smart phones and speaker systems has mad...

Wireless Ranging Performance Improvement Technique

In the last few years many research efforts have been focused on various wireless measurement techniques for indoor object positioning. In this paper we focuses on the performance improvement of the classical wireless ra...

Estimation of Trace Element Concentrations in Anti-Epileptic Medicinal Plants by Using EDXRF

Trace elemental analysis was carried out in 15 anti-epileptic medicinal plants using Energy Dispersive X-Ray Fluorescence (EDXRF) technique, with EX-3600, EDXRF spectrometer. The quantitative analysis is carried out usin...

Download PDF file
  • EP ID EP357523
  • DOI -
  • Views 64
  • Downloads 0

How To Cite

(2015). Detecting the Rootkit through Dynamic Analysis. International Journal of Science and Research (IJSR), 4(3), -. https://europub.co.uk/articles/-A-357523