Application of a methodology to characterize rootkits retrieved from honeynets
暂无分享,去创建一个
[1] J.B. Grizzard,et al. A Methodology to Characterize Kernel Level Rootkit Exploits that Overwrite the System Call Table , 2004, IEEE SoutheastCon, 2004. Proceedings..
[2] John G. Levine. A Methodology for Detecting and Classifying Rootkit Exploits , 2004 .
[3] Harold W. Thimbleby,et al. A Framework for Modelling Trojans and Computer Virus Infection , 1998, Comput. J..
[4] Henry L. Owen,et al. A methodology to detect and characterize Kernel level rootkit exploits involving redirection of the system call table , 2004, Second IEEE International Information Assurance Workshop, 2004. Proceedings..
[5] Dino Zovi. Kernel Rootkits , 2001 .
[6] L. Spitzner,et al. Honeypots: Tracking Hackers , 2002 .
[7] Henry Owen,et al. A Methodology for Detecting New Binary Rootkit Exploits , 2003 .