Show simple item record

dc.contributor.authorLobo, Desmonden_US
dc.contributor.authorWatters, Paulen_US
dc.contributor.authorWu, Xinwenen_US
dc.contributor.editorMingmin Gong, Qi Luoen_US
dc.date.accessioned2017-05-03T15:50:37Z
dc.date.available2017-05-03T15:50:37Z
dc.date.issued2010en_US
dc.date.modified2012-09-02T23:21:38Z
dc.identifier.doi10.1109/WKDD.2010.23en_US
dc.identifier.urihttp://hdl.handle.net/10072/37756
dc.description.abstractIn this paper, we focus on rootkits, a special type of malicious software (malware) that operates in an obfuscated and stealthy mode to evade detection. Categorizing these rootkits will help in detecting future attacks against the business community. We first developed a theoretical framework for classifying rootkits. Based on our theoretical framework, we then proposed a new rootkit classification system and tested our system on a sample of rootkits that use inline function hooking. Our experimental results showed that our system could successfully categorize the sample using unsupervised clustering.en_US
dc.description.peerreviewedYesen_US
dc.description.publicationstatusYesen_US
dc.format.extent338911 bytes
dc.format.mimetypeapplication/pdf
dc.languageEnglishen_US
dc.language.isoen_US
dc.publisherIEEEen_US
dc.publisher.placeLos Alamitosen_US
dc.publisher.urihttp://www.iita-conference.org/wkdd2010/en_US
dc.relation.ispartofstudentpublicationNen_US
dc.relation.ispartofconferencename3rd International Conference on Knowledge Discovery and Data Mining (WKDD 2010)en_US
dc.relation.ispartofconferencetitleProceedings Third International Conference on Knowledge Discovery and Data Mining WKDD 2010en_US
dc.relation.ispartofdatefrom2010-01-08en_US
dc.relation.ispartofdateto2010-01-11en_US
dc.relation.ispartoflocationPhuket, Thailanden_US
dc.rights.retentionYen_US
dc.subject.fieldofresearchInformation Systems not elsewhere classifieden_US
dc.subject.fieldofresearchcode080699en_US
dc.titleRBACS: Rootkit Behavioral Analysis and Classification Systemen_US
dc.typeConference outputen_US
dc.type.descriptionE1 - Conference Publications (HERDC)en_US
dc.type.codeE - Conference Publicationsen_US
gro.rights.copyrightCopyright 2010 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.en_US
gro.date.issued2010
gro.hasfulltextFull Text


Files in this item

This item appears in the following Collection(s)

  • Conference outputs
    Contains papers delivered by Griffith authors at national and international conferences.

Show simple item record