Telecommunications Science ›› 2020, Vol. 36 ›› Issue (5): 39-46.doi: 10.11959/j.issn.1000-0801.2020142

• Topic: Intelligent and Highly Confrontational Development of Network Security • Previous Articles     Next Articles

Defense of hidden backdoor technology for Web

Liyue CHEN1,Xin SUN2,Tiansheng CHENG3,Chunming WU3,Shuangxi CHEN3,4()   

  1. 1 State Grid Zhejiang Electric Power Co.,Ltd.,Hangzhou 310027,China
    2 State Grid Zhejiang Electric Power Co.,Ltd.Research Institute,Hangzhou 310027,China
    3 Zhejiang University,Hangzhou 310058,China
    4 Jiaxing Vocational and Technical College,Jiaxing 314036,China
  • Revised:2020-04-25 Online:2020-05-20 Published:2020-05-18
  • Supported by:
    The Science and Technology Funding Project of State Grid(52110118001F)

Abstract:

Rootkit is a set of persistent and undetectable attack technologies,which can hide their attack behavior and backdoor trace by modifying software or kernel in operating system and changing execution path of instruction.Firstly,the basic definition and evolution of Rootkit were introduced,then the operating principle,current mainstream technology and detection methods of Rootkit were discussed.Then,through comparative experiments on performance and security,the application of mimic defense system was described for Web based on dynamic,heterogeneous,redundant structure under Trojan Horse attack.Experiments show that mimic defense system can effectively defend against Trojan Horse in tests in the premise of low overhead.At last,the opportunities and challenges of the DHR system were summarized.

Key words: Rootkit, dynamic heterogeneous redundant structure, mimic defense

CLC Number: 

No Suggested Reading articles found!