Detecting the Rootkit through Dynamic Analysis

Journal Title: UNKNOWN - Year 2015, Vol 4, Issue 3

Abstract

Network security provides a security for all the programs or files or system. Some attackers attack a programs or files or passwords or other personal details of the user. Like the same way Rootkit is one of the malicious file or a software which attacks a network security and acts an administrator in an absence of the user knowledge. Rootkit virus is stealthy in nature and is installed in the system through a file or a driver or coding. It attacks the system through the kernel-level in the real time. Files are hided through the rootkit in the absence of the user knowledge. They can monitor the other user’s activity when the botnet is installed in the other system. Rootkit allows the attacker through the backdoor. So that attacker can steal the users personal details. Task manager, service and the registry are got destroyed or made changes. The attacker can make any changes at any time. Finally the malicious file and authorized files are distinguished and their accuracy is performed.

Authors and Affiliations

Keywords

Related Articles

Annotation Effective Cad Using Content and Information Extraction

"A large number of enterprises organizations currently generate and share literary descriptions of their own products and services. Such collections of data contain important structured information, which remains more un...

Some Sacred Trees and their Medicinal Uses from Amravati District (Maharashtra)

"Plant worship is one of the earliest forms of religion in ancient world . Here is a comprehensive account on some of the important trees, which are not only being used in sacrificial rites and ritues but also in medicin...

An Improved Method for Tanzania Number Plate Location and Segmentation Based on Mathematical Morphology and Regional Features of an Image

In the Automatic Number Plate Recognition System (ANPR), Plate Number Location and Character segmentation are very important parts of an ANPR system before Recognition part. In this paper, plate number localization and c...

Assessment of Granulometry and Environment of Deposition of Coastal Sediments from Kollam beach to Marattadi, Kerala, India

The textural characteristics of beach sediments mainly depend on the shore processes. The present study focuses on the sediment characterization and environment of deposition of beach sediments from Kollam to Marattadi,...

Establishing Secret Key in Wireless Environment by Using Techniques of Keyless Cryptosystem

Cryptography is the idea of protected communication. Security guaranteed by different crypto ways of encryption, decryption, secret key establishment, etc .One such way is Keyless Cryptosystem. This new technique of Cryp...

Download PDF file
  • EP ID EP357523
  • DOI -
  • Views 86
  • Downloads 0

How To Cite

(2015). Detecting the Rootkit through Dynamic Analysis. UNKNOWN, 4(3), -. https://europub.co.uk/articles/-A-357523