A Study on Process-hidden Rootkit Detection Mechanism in Cloud Service Environments
碩士 === 大葉大學 === 資訊管理學系碩士班 === 101 === Since cloud service’s development becomes mature, the advantages of cloud service also give hackers easy way to create complicated and exquisite techniques of attacks. Rootkit always be used in these techniques and exquisite one is Trojan-based rootkits. In th...
Main Authors: | Cheng-Hua Chi, 杞承樺 |
---|---|
Other Authors: | Woei-Jiunn Tsaur |
Format: | Others |
Language: | zh-TW |
Published: |
2013
|
Online Access: | http://ndltd.ncl.edu.tw/handle/37856256552890637490 |
Similar Items
-
A Study on Registry-hidden Rootkit Detection Mechanism in Cloud Service Environments
by: Shu-Ting Tseng, et al.
Published: (2013) -
Windows Rootkits Detection Technologies for Service Platforms in Cloud Computing
by: Huang, Yihsi, et al.
Published: (2011) -
Integrated Technologies for Defending against Rootkit Malware in Cloud Service Environments
by: CHANG CHEN, et al.
Published: (2014) -
Reinforcing the Defense against Rootkit-based Malicious Software in Cloud Computing Environment
by: Wei-Lun Lai, et al.
Published: (2013) -
EPA-RIMM-V: Efficient Rootkit Detection for Virtualized Environments
by: Vibhute, Tejaswini Ajay
Published: (2018)