dc.contributor.author | Lobo, Desmond | |
dc.contributor.author | Watters, Paul | |
dc.contributor.author | Wu, Xin-Wen | |
dc.contributor.editor | ICCSN | |
dc.date.accessioned | 2017-05-03T15:50:36Z | |
dc.date.available | 2017-05-03T15:50:36Z | |
dc.date.issued | 2010 | |
dc.date.modified | 2012-09-02T23:02:19Z | |
dc.identifier.doi | 10.1109/ICCSN.2010.14 | |
dc.identifier.uri | http://hdl.handle.net/10072/37697 | |
dc.description.abstract | Rootkits refer to software that is used to hide the presence of malware from system/network administrators and permit an attacker to take control of a computer. In our previous work, we designed a system that would categorize rootkits based on the hooks that had been created. Focusing on rootkits that use inline function hooking techniques, we showed that our system could successfully categorize a sample of rootkits using unsupervised EM clustering. In this paper, we extend our previous work by outlining a new procedure to help system/network administrators identify the rootkits that have infected their machines. Using a logistic regression model for profiling families of rootkits, we were able to identify at least one of the rootkits that had infected each of the systems that we tested. | |
dc.description.peerreviewed | Yes | |
dc.description.publicationstatus | Yes | |
dc.format.extent | 310023 bytes | |
dc.format.mimetype | application/pdf | |
dc.language | English | |
dc.language.iso | eng | |
dc.publisher | IEEE Computer Society | |
dc.publisher.place | Washington, DC, USA | |
dc.relation.ispartofstudentpublication | N | |
dc.relation.ispartofconferencename | 2010 International Conference on Communication Software and Networks | |
dc.relation.ispartofconferencetitle | Proceedings of the 2010 Second International Conference on Communication Software and Networks | |
dc.relation.ispartofdatefrom | 2010-02-26 | |
dc.relation.ispartofdateto | 2010-02-28 | |
dc.relation.ispartoflocation | Singapore | |
dc.rights.retention | Y | |
dc.subject.fieldofresearchcode | 280505 | |
dc.title | A New Procedure to Help System/Network Administrators Identify Multiple Rootkit Infections | |
dc.type | Conference output | |
dc.type.description | E1 - Conferences | |
dc.type.code | E - Conference Publications | |
gro.rights.copyright | © 2010 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE. | |
gro.date.issued | 2010 | |
gro.hasfulltext | Full Text | |
gro.griffith.author | Wu, Xin-Wen | |