A Study on Process-hidden Rootkit Detection Mechanism in Cloud Service Environments
碩士 === 大葉大學 === 資訊管理學系碩士班 === 101 === Since cloud service’s development becomes mature, the advantages of cloud service also give hackers easy way to create complicated and exquisite techniques of attacks. Rootkit always be used in these techniques and exquisite one is Trojan-based rootkits. In th...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2013
|
Online Access: | http://ndltd.ncl.edu.tw/handle/37856256552890637490 |
id |
ndltd-TW-101DYU00396003 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-101DYU003960032015-10-13T22:24:28Z http://ndltd.ncl.edu.tw/handle/37856256552890637490 A Study on Process-hidden Rootkit Detection Mechanism in Cloud Service Environments 雲端服務環境之程序隱藏型Rootkit偵測機制研究 Cheng-Hua Chi 杞承樺 碩士 大葉大學 資訊管理學系碩士班 101 Since cloud service’s development becomes mature, the advantages of cloud service also give hackers easy way to create complicated and exquisite techniques of attacks. Rootkit always be used in these techniques and exquisite one is Trojan-based rootkits. In this rootkit-combined technique, “removing double linked list” and “using system services” are very hard to detect, which is why it always let users download data unconsciously and spread to contiguous systems and networks gradually by opening files. The way of attack is hiding to wait opportunities, and is controlled by a remote server. And pretends to be proper procedures or threads after conveying instructions, and steals important information by network transfer back to the attacker. The above-mentioned trick is called the technique of “APT” (Advanced Persistent Threat) which becomes a big menace to cloud services. Although famous anti-virus software can detect process-hidden rootkits, they still cannot work when confronting to mixed rootkits. Therefore, this research will develop a mechanism for detecting process-hidden rootkits in cloud operating systems to avoid APT attacks on clouds, which can effectively detect mixed rootkits of “removing double linked list” and “using system services”. Moreover, the proposed mechanism can help anti-virus software and cloud systems service provider develop a complete protection mechanism against rootkit attacks. Woei-Jiunn Tsaur 曹偉駿 2013 學位論文 ; thesis 58 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 大葉大學 === 資訊管理學系碩士班 === 101 === Since cloud service’s development becomes mature, the advantages of cloud service also give hackers easy way to create complicated and exquisite techniques of attacks. Rootkit always be used in these techniques and exquisite one is Trojan-based rootkits. In this rootkit-combined technique, “removing double linked list” and “using system services” are very hard to detect, which is why it always let users download data unconsciously and spread to contiguous systems and networks gradually by opening files. The way of attack is hiding to wait opportunities, and is controlled by a remote server. And pretends to be proper procedures or threads after conveying instructions, and steals important information by network transfer back to the attacker. The above-mentioned trick is called the technique of “APT” (Advanced Persistent Threat) which becomes a big menace to cloud services. Although famous anti-virus software can detect process-hidden rootkits, they still cannot work when confronting to mixed rootkits.
Therefore, this research will develop a mechanism for detecting process-hidden rootkits in cloud operating systems to avoid APT attacks on clouds, which can effectively detect mixed rootkits of “removing double linked list” and “using system services”. Moreover, the proposed mechanism can help anti-virus software and cloud systems service provider develop a complete protection mechanism against rootkit attacks.
|
author2 |
Woei-Jiunn Tsaur |
author_facet |
Woei-Jiunn Tsaur Cheng-Hua Chi 杞承樺 |
author |
Cheng-Hua Chi 杞承樺 |
spellingShingle |
Cheng-Hua Chi 杞承樺 A Study on Process-hidden Rootkit Detection Mechanism in Cloud Service Environments |
author_sort |
Cheng-Hua Chi |
title |
A Study on Process-hidden Rootkit Detection Mechanism in Cloud Service Environments |
title_short |
A Study on Process-hidden Rootkit Detection Mechanism in Cloud Service Environments |
title_full |
A Study on Process-hidden Rootkit Detection Mechanism in Cloud Service Environments |
title_fullStr |
A Study on Process-hidden Rootkit Detection Mechanism in Cloud Service Environments |
title_full_unstemmed |
A Study on Process-hidden Rootkit Detection Mechanism in Cloud Service Environments |
title_sort |
study on process-hidden rootkit detection mechanism in cloud service environments |
publishDate |
2013 |
url |
http://ndltd.ncl.edu.tw/handle/37856256552890637490 |
work_keys_str_mv |
AT chenghuachi astudyonprocesshiddenrootkitdetectionmechanismincloudserviceenvironments AT qǐchénghuà astudyonprocesshiddenrootkitdetectionmechanismincloudserviceenvironments AT chenghuachi yúnduānfúwùhuánjìngzhīchéngxùyǐncángxíngrootkitzhēncèjīzhìyánjiū AT qǐchénghuà yúnduānfúwùhuánjìngzhīchéngxùyǐncángxíngrootkitzhēncèjīzhìyánjiū AT chenghuachi studyonprocesshiddenrootkitdetectionmechanismincloudserviceenvironments AT qǐchénghuà studyonprocesshiddenrootkitdetectionmechanismincloudserviceenvironments |
_version_ |
1718076279821959168 |