PREDICTING THE FUTURE OF STEALTH ATTACKS
暂无分享,去创建一个
This paper takes an in-depth look into the attack strategies of recent rootkits and analyses what has worked for them. In doing so it highlights some of the profi table attack methodologies from the perspective of kernel rootkits. The discussion in this paper about prediction of the future of stealth attacks is derived from our analysis of multiple rootkits over many years and also based on current trends and some specifi c techniques. The main aim of this discussion is to help reanalyse rootkit defences and decide what technological improvements (if any) are needed in current and future products to better combat the ever changing stealth threat landscape.
[1] Greg Hoglund,et al. Rootkits: Subverting the Windows Kernel , 2005 .