Analysis of Automated Rootkit Detection Methodologies
eBook - PDF
No longer available |Learn more

Analysis of Automated Rootkit Detection Methodologies

ANALYSIS, COMPARISON, AND EVALUATION OF THE EFFECTIVENESS OF ROOTKIT DETECTION METHODOLOGIES

Eugene Chuvyrov

  1. 116 pages
  2. English
  3. PDF
  4. Available on iOS & Android
eBook - PDF
No longer available |Learn more

Analysis of Automated Rootkit Detection Methodologies

ANALYSIS, COMPARISON, AND EVALUATION OF THE EFFECTIVENESS OF ROOTKIT DETECTION METHODOLOGIES

Eugene Chuvyrov

Book details
Table of contents
Citations

About This Book

The focus of this study was to identify, analyze, compare, and evaluate the effectiveness of rootkit detection methodologies. Specifically, two methodologies were studied in depth. The first is the heuristic of statically analyzing kernel module binaries, which attempts to determine whether or not a software module's behavior is malicious, prior to passing it to the operating system. The second methodology analyzed in this paper, the Strider Ghostbuster framework, compares what a computer system believes to be true (i.e., what modules are visible to the OS) to the absolute "truth, " which is determined via low-level system programming. The expected results of this comparison should always be equal, unless a malicious tampering on the system is observed. After comparing the effectiveness of detection methodologies on a set of well-known (and publicly available) rootkits, including a very simple rootkit built by the author, the methodologies are compared and their effectiveness is evaluated.

Frequently asked questions

How do I cancel my subscription?
Simply head over to the account section in settings and click on “Cancel Subscription” - it’s as simple as that. After you cancel, your membership will stay active for the remainder of the time you’ve paid for. Learn more here.
Can/how do I download books?
At the moment all of our mobile-responsive ePub books are available to download via the app. Most of our PDFs are also available to download and we're working on making the final remaining ones downloadable now. Learn more here.
What is the difference between the pricing plans?
Both plans give you full access to the library and all of Perlego’s features. The only differences are the price and subscription period: With the annual plan you’ll save around 30% compared to 12 months on the monthly plan.
What is Perlego?
We are an online textbook subscription service, where you can get access to an entire online library for less than the price of a single book per month. With over 1 million books across 1000+ topics, we’ve got you covered! Learn more here.
Do you support text-to-speech?
Look out for the read-aloud symbol on your next book to see if you can listen to it. The read-aloud tool reads text aloud for you, highlighting the text as it is being read. You can pause it, speed it up and slow it down. Learn more here.
Is Analysis of Automated Rootkit Detection Methodologies an online PDF/ePUB?
Yes, you can access Analysis of Automated Rootkit Detection Methodologies by Eugene Chuvyrov in PDF and/or ePUB format, as well as other popular books in Computer Science & Operating Systems. We have over one million books available in our catalogue for you to explore.

Information

Table of contents

Citation styles for Analysis of Automated Rootkit Detection Methodologies

APA 6 Citation

Chuvyrov, E. (2011). Analysis of Automated Rootkit Detection Methodologies (1st ed.). LAP LAMBERT Academic Publishing. Retrieved from https://www.perlego.com/book/3331330/analysis-of-automated-rootkit-detection-methodologies-analysis-comparison-and-evaluation-of-the-effectiveness-of-rootkit-detection-methodologies-pdf (Original work published 2011)

Chicago Citation

Chuvyrov, Eugene. (2011) 2011. Analysis of Automated Rootkit Detection Methodologies. 1st ed. LAP LAMBERT Academic Publishing. https://www.perlego.com/book/3331330/analysis-of-automated-rootkit-detection-methodologies-analysis-comparison-and-evaluation-of-the-effectiveness-of-rootkit-detection-methodologies-pdf.

Harvard Citation

Chuvyrov, E. (2011) Analysis of Automated Rootkit Detection Methodologies. 1st edn. LAP LAMBERT Academic Publishing. Available at: https://www.perlego.com/book/3331330/analysis-of-automated-rootkit-detection-methodologies-analysis-comparison-and-evaluation-of-the-effectiveness-of-rootkit-detection-methodologies-pdf (Accessed: 15 October 2022).

MLA 7 Citation

Chuvyrov, Eugene. Analysis of Automated Rootkit Detection Methodologies. 1st ed. LAP LAMBERT Academic Publishing, 2011. Web. 15 Oct. 2022.