作者投稿和查稿 主编审稿 专家审稿 编委审稿 远程编辑

计算机工程 ›› 2008, Vol. 34 ›› Issue (18): 70-71. doi: 10.3969/j.issn.1000-3428.2008.18.025

• 软件技术与数据库 • 上一篇    下一篇

永久型Windows Rootkit 检测技术

王全民1,2,于佳耕2,赵 彤2,韩红英2   

  1. (1. 天津大学计算机学院,天津 300072;2. 北京工业大学计算机学院,北京 100022)
  • 收稿日期:1900-01-01 修回日期:1900-01-01 出版日期:2008-09-20 发布日期:2008-09-20

Detection Technique of Persistent Windows Rootkit

WANG Quan-min1,2, YU Jia-geng2, ZHAO Tong2, HAN Hong-ying2   

  1. (1. College of Computer, Tianjin University, Tianjin 300072;2. College of Computer, Beijing University of Technology, Beijing 100022)
  • Received:1900-01-01 Revised:1900-01-01 Online:2008-09-20 Published:2008-09-20

摘要: 永久型Rootkit可以长期隐秘在系统中,并隐藏恶意代码,威胁计算机的安全。该文应用cross-view方法构建监控系统,采用文件系统过滤驱动与钩挂系统服务分析系统行为,判定系统是否已被装入永久型Windows Rootkit,并完成对经典Rootkit-hacker defender及它所保护的恶意程序的检测。由于该检测技术使用底层驱动监测,不依赖特征码,因此对内核级和将来出现的Rootkit具有良好的检测
效果。

关键词: 监控系统, 永久型Rootkit, cross-view方法

Abstract: Because of permanently storing and hiding intruder’s codes, persistent Rootkit becomes a very important issue of computer security. This paper applies the cross-view method to construct the monitor system. It is implemented to decide whether the system is installed persistent windows Rootkit by analyzing system’s behaviors using file system filter driver and hooking system services. The system detectes Rootkit-hacker defender which is the most classical Rootkit in the real world and some malwares protected by it. Due to the use of low-level driver and not depending on signature, it also has good performance in detecting kernel level and unknown Rootkit.

Key words: monitor system, persistent Rootkit, cross-view

中图分类号: