Please use this identifier to cite or link to this item: http://ir.futminna.edu.ng:8080/jspui/handle/123456789/11518
Full metadata record
DC FieldValueLanguage
dc.contributor.authorSubairu, S. O.-
dc.contributor.authorIsah, Abdulkadir Onivehu-
dc.contributor.authorAlhassan, J. K.-
dc.date.accessioned2021-07-25T11:22:41Z-
dc.date.available2021-07-25T11:22:41Z-
dc.date.issued2017-
dc.identifier.urihttps://www.ijisc.com/articles/2017-01-08.pdf-
dc.identifier.urihttp://repository.futminna.edu.ng:8080/jspui/handle/123456789/11518-
dc.description.abstractResearchers and security expert has been vigorously on the study of malwares, great interest has been drawn to rootkits. Rootkits are a notably dangerously type of malware with the ability to cover their presence on the compromised host operating system and allow malicious recreation via spyware and other more obvious types of malware undetected. Once a rootkit gained access to a system, it can be very tough to track and do away with them. In this research, various antimalware tools were critically analyzed and studied to ascertain their effectiveness in combating a deadly malware called tdl-4. An analytical model developed was used to obtain all experimental results and findings which are documented for further work.en_US
dc.language.isoenen_US
dc.publisherInternational Journal of Information Security and Cybercrimeen_US
dc.subjectRootkit,en_US
dc.subjectTDL-4en_US
dc.subjectAntimalwareen_US
dc.subjectMalwareen_US
dc.subjectDetectoren_US
dc.titleComparative Performance Study of Antimalware Tools on TDL-4 Rootkiten_US
dc.typeArticleen_US
Appears in Collections:Cyber Security Science

Files in This Item:
File Description SizeFormat 
IJISC Vol 6 Issue 1, 2017.pdf218.79 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.