Telecommunications Science ›› 2018, Vol. 34 ›› Issue (12): 33-45.doi: 10.11959/j.issn.1000-0801.2018298

• research and development • Previous Articles     Next Articles

Mechanism and implementation of Rootkit attack and defense

Fujuan LI,Qun WANG   

  1. Department of Computer Information and Cyber Security,Jiangsu Police Institute,Nanjing 210031,China
  • Revised:2018-12-10 Online:2018-12-01 Published:2019-01-02
  • Supported by:
    Key Construction Discipline Construction Project of Jiangsu Province During the 13th Five-Year Plan Period(2016-0838);Jiangsu University Brand Professional Construction Project Subsidy Project(PZY2015C203);Jiangsu Province Fifth Phase “333 Project” Scientific Research Project(BRA2017443);Jiangsu University Philosophy and Social Science Research Fund Project(2018SJA0456)

Abstract:

Rootkit is a set of malicious codes that can attack the system kernel and achieve deep hiding,which has posed serious threats to cyber security.Firstly,the basic features of Rootkit/Bootkit were introduced,and the characteristics of Rootkit attacks in user mode and kernel mode were compared and analyzed.Thereafter,the implementation principles and working mechanisms of Hook,DKOM and virtualization technologies involved in Rootkit attacks were emphatically analyzed.Combined with the specific attack behaviors,the main detection methods and defense techniques for Rootkit attacks were discussed at the end.

Key words: network attack and defense, malware, Rootkit, hooking attack, network security

CLC Number: 

No Suggested Reading articles found!