메뉴 건너뛰기




Volumn , Issue , 2004, Pages 15-21

Application of a methodology to characterize rootkits retrieved from honeynets

Author keywords

Forensics; Honeynet; Rootkits; Signatures

Indexed keywords

COMPUTER OPERATING SYSTEMS; COMPUTER SYSTEMS; DATA PRIVACY; DATA PROCESSING; INFORMATION MANAGEMENT; SECURITY OF DATA;

EID: 15944384236     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (10)

References (16)
  • 3
    • 0012109964 scopus 로고    scopus 로고
    • Indianapolis, IN: Addison-Wesley
    • The Honeynet Project, Know Your Enemy, Indianapolis, IN: Addison-Wesley, 2002, p. 19.
    • (2002) Know your Enemy , pp. 19
  • 4
    • 15944387870 scopus 로고    scopus 로고
    • Nov
    • http://www.linuxsecurity.com/feature_stories/feature_story-141.html. Nov 2003.
    • (2003)
  • 5
    • 15944385748 scopus 로고    scopus 로고
    • Nov
    • http://www.packetfu.org/hpa.html, Nov 2003.
    • (2003)
  • 7
    • 15944394155 scopus 로고    scopus 로고
    • Sep
    • http://la-samhna.de/library/rootkits/detect.html, Sep 2003
    • (2003)
  • 8
    • 2442553830 scopus 로고    scopus 로고
    • A methodology to characterize kernel level rootkit exploits that overwrite the system call table
    • Greensboro NC, 26-28 Mar
    • J. Levine, J. Grizzard, P. Hutto, H. Owen, "A Methodology to Characterize Kernel Level Rootkit Exploits that Overwrite the System Call Table", to be presented at SoutheastCon 2004, Greensboro NC, 26-28 Mar, 2004.
    • (2004) SoutheastCon 2004
    • Levine, J.1    Grizzard, J.2    Hutto, P.3    Owen, H.4
  • 9
    • 15944364532 scopus 로고    scopus 로고
    • Dec
    • http://www.chkrootkit.org, Dec 2003.
    • (2003)
  • 10
    • 15944400780 scopus 로고    scopus 로고
    • 3 July Oct
    • Zovi, D., "Kernel Rootkits", http://www.cs.unm.edu/~ghandi/lkr. pdf, 3 July 2001, Oct 2003.
    • (2001) Kernel Rootkits
    • Zovi, D.1
  • 11
    • 15944383163 scopus 로고    scopus 로고
    • Sep
    • http://www.cs.tut.fi/~rammer/aide.html, Sep 2002.
    • (2002)
  • 12
    • 0032260307 scopus 로고    scopus 로고
    • A framework for modeling trojans and computer virus infections
    • Thimbleby, S. Anderson, p. Cairns, "A Framework for Modeling Trojans and Computer Virus Infections," The Computer Journal, vol. 41, no.7 pp. 444-458, 1998.
    • (1998) The Computer Journal , vol.41 , Issue.7 , pp. 444-458
    • Thimbleby, S.A.1    Cairns, P.2
  • 13
    • 15944374377 scopus 로고    scopus 로고
    • Aug
    • http://www.honeylux.org.lu/project/honeyluxR1/result/sub01/report/hax. html, Aug 2003.
    • (2003)
  • 14
    • 15944408114 scopus 로고    scopus 로고
    • Dec
    • http://packetstormsecurity.nl/trojans/indexdate.shtml/clean-osf.8759.tez/ README, Dec 2003.
    • (2003)
  • 15
    • 36448951483 scopus 로고    scopus 로고
    • A methodology for detecting new binary rootkit exploits
    • Ocho Rios, Jamaica, 4-6 Apr
    • J. Levine, H. Owen, B. Culver, "A Methodology for Detecting New Binary Rootkit Exploits", presented at the 2003 IEEE SoutheastCon 2003, Ocho Rios, Jamaica, 4-6 Apr 2003.
    • (2003) 2003 IEEE SoutheastCon 2003
    • Levine, J.1    Owen, H.2    Culver, B.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.