A Study on Process-hidden Rootkit Detection Mechanism in Cloud Service Environments

碩士 === 大葉大學 === 資訊管理學系碩士班 === 101 === Since cloud service’s development becomes mature, the advantages of cloud service also give hackers easy way to create complicated and exquisite techniques of attacks. Rootkit always be used in these techniques and exquisite one is Trojan-based rootkits. In th...

Full description

Bibliographic Details
Main Authors: Cheng-Hua Chi, 杞承樺
Other Authors: Woei-Jiunn Tsaur
Format: Others
Language:zh-TW
Published: 2013
Online Access:http://ndltd.ncl.edu.tw/handle/37856256552890637490