%A Liyue CHEN,Xin SUN,Tiansheng CHENG,Chunming WU,Shuangxi CHEN %T Defense of hidden backdoor technology for Web %0 Journal Article %D 2020 %J Telecommunications Science %R 10.11959/j.issn.1000-0801.2020142 %P 39-46 %V 36 %N 5 %U {https://www.infocomm-journal.com/dxkx/CN/abstract/article_170195.shtml} %8 2020-05-20 %X

Rootkit is a set of persistent and undetectable attack technologies,which can hide their attack behavior and backdoor trace by modifying software or kernel in operating system and changing execution path of instruction.Firstly,the basic definition and evolution of Rootkit were introduced,then the operating principle,current mainstream technology and detection methods of Rootkit were discussed.Then,through comparative experiments on performance and security,the application of mimic defense system was described for Web based on dynamic,heterogeneous,redundant structure under Trojan Horse attack.Experiments show that mimic defense system can effectively defend against Trojan Horse in tests in the premise of low overhead.At last,the opportunities and challenges of the DHR system were summarized.