A Study on Process-hidden Rootkit Detection Mechanism in Cloud Service Environments
碩士 === 大葉大學 === 資訊管理學系碩士班 === 101 === Since cloud service’s development becomes mature, the advantages of cloud service also give hackers easy way to create complicated and exquisite techniques of attacks. Rootkit always be used in these techniques and exquisite one is Trojan-based rootkits. In th...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2013
|
Online Access: | http://ndltd.ncl.edu.tw/handle/37856256552890637490 |