A Study on Process-hidden Rootkit Detection Mechanism in Cloud Service Environments

碩士 === 大葉大學 === 資訊管理學系碩士班 === 101 === Since cloud service’s development becomes mature, the advantages of cloud service also give hackers easy way to create complicated and exquisite techniques of attacks. Rootkit always be used in these techniques and exquisite one is Trojan-based rootkits. In th...

Full description

Bibliographic Details
Main Authors: Cheng-Hua Chi, 杞承樺
Other Authors: Woei-Jiunn Tsaur
Format: Others
Language:zh-TW
Published: 2013
Online Access:http://ndltd.ncl.edu.tw/handle/37856256552890637490
id ndltd-TW-101DYU00396003
record_format oai_dc
spelling ndltd-TW-101DYU003960032015-10-13T22:24:28Z http://ndltd.ncl.edu.tw/handle/37856256552890637490 A Study on Process-hidden Rootkit Detection Mechanism in Cloud Service Environments 雲端服務環境之程序隱藏型Rootkit偵測機制研究 Cheng-Hua Chi 杞承樺 碩士 大葉大學 資訊管理學系碩士班 101 Since cloud service’s development becomes mature, the advantages of cloud service also give hackers easy way to create complicated and exquisite techniques of attacks. Rootkit always be used in these techniques and exquisite one is Trojan-based rootkits. In this rootkit-combined technique, “removing double linked list” and “using system services” are very hard to detect, which is why it always let users download data unconsciously and spread to contiguous systems and networks gradually by opening files. The way of attack is hiding to wait opportunities, and is controlled by a remote server. And pretends to be proper procedures or threads after conveying instructions, and steals important information by network transfer back to the attacker. The above-mentioned trick is called the technique of “APT” (Advanced Persistent Threat) which becomes a big menace to cloud services. Although famous anti-virus software can detect process-hidden rootkits, they still cannot work when confronting to mixed rootkits. Therefore, this research will develop a mechanism for detecting process-hidden rootkits in cloud operating systems to avoid APT attacks on clouds, which can effectively detect mixed rootkits of “removing double linked list” and “using system services”. Moreover, the proposed mechanism can help anti-virus software and cloud systems service provider develop a complete protection mechanism against rootkit attacks. Woei-Jiunn Tsaur 曹偉駿 2013 學位論文 ; thesis 58 zh-TW
collection NDLTD
language zh-TW
format Others
sources NDLTD
description 碩士 === 大葉大學 === 資訊管理學系碩士班 === 101 === Since cloud service’s development becomes mature, the advantages of cloud service also give hackers easy way to create complicated and exquisite techniques of attacks. Rootkit always be used in these techniques and exquisite one is Trojan-based rootkits. In this rootkit-combined technique, “removing double linked list” and “using system services” are very hard to detect, which is why it always let users download data unconsciously and spread to contiguous systems and networks gradually by opening files. The way of attack is hiding to wait opportunities, and is controlled by a remote server. And pretends to be proper procedures or threads after conveying instructions, and steals important information by network transfer back to the attacker. The above-mentioned trick is called the technique of “APT” (Advanced Persistent Threat) which becomes a big menace to cloud services. Although famous anti-virus software can detect process-hidden rootkits, they still cannot work when confronting to mixed rootkits. Therefore, this research will develop a mechanism for detecting process-hidden rootkits in cloud operating systems to avoid APT attacks on clouds, which can effectively detect mixed rootkits of “removing double linked list” and “using system services”. Moreover, the proposed mechanism can help anti-virus software and cloud systems service provider develop a complete protection mechanism against rootkit attacks.
author2 Woei-Jiunn Tsaur
author_facet Woei-Jiunn Tsaur
Cheng-Hua Chi
杞承樺
author Cheng-Hua Chi
杞承樺
spellingShingle Cheng-Hua Chi
杞承樺
A Study on Process-hidden Rootkit Detection Mechanism in Cloud Service Environments
author_sort Cheng-Hua Chi
title A Study on Process-hidden Rootkit Detection Mechanism in Cloud Service Environments
title_short A Study on Process-hidden Rootkit Detection Mechanism in Cloud Service Environments
title_full A Study on Process-hidden Rootkit Detection Mechanism in Cloud Service Environments
title_fullStr A Study on Process-hidden Rootkit Detection Mechanism in Cloud Service Environments
title_full_unstemmed A Study on Process-hidden Rootkit Detection Mechanism in Cloud Service Environments
title_sort study on process-hidden rootkit detection mechanism in cloud service environments
publishDate 2013
url http://ndltd.ncl.edu.tw/handle/37856256552890637490
work_keys_str_mv AT chenghuachi astudyonprocesshiddenrootkitdetectionmechanismincloudserviceenvironments
AT qǐchénghuà astudyonprocesshiddenrootkitdetectionmechanismincloudserviceenvironments
AT chenghuachi yúnduānfúwùhuánjìngzhīchéngxùyǐncángxíngrootkitzhēncèjīzhìyánjiū
AT qǐchénghuà yúnduānfúwùhuánjìngzhīchéngxùyǐncángxíngrootkitzhēncèjīzhìyánjiū
AT chenghuachi studyonprocesshiddenrootkitdetectionmechanismincloudserviceenvironments
AT qǐchénghuà studyonprocesshiddenrootkitdetectionmechanismincloudserviceenvironments
_version_ 1718076279821959168