Please use this identifier to cite or link to this item:
http://ir.futminna.edu.ng:8080/jspui/handle/123456789/11673
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Subairu, Sikiru Olanrewaju | - |
dc.contributor.author | Alhassan, J.K | - |
dc.contributor.author | Sanjay, Misra | - |
dc.contributor.author | Abayomi-Alli, Olusola | - |
dc.contributor.author | Ahuja, Ravin | - |
dc.contributor.author | Damasevicius, Robertas | - |
dc.contributor.author | Maskeliunas, Rytis | - |
dc.date.accessioned | 2021-07-26T13:22:31Z | - |
dc.date.available | 2021-07-26T13:22:31Z | - |
dc.date.issued | 2020 | - |
dc.identifier.citation | Cite this paper as: Subairu S.O. et al. (2020) An Experimental Approach to Unravel Effects of Malware on System Network Interface. In: Jain V., Chaudhary G., Taplamacioglu M., Agarwal M. (eds) Advances in Data Sciences, Security and Applications. Lecture Notes in Electrical Engineering, vol 612. Springer, Singapore. https://doi.org/10.1007/978-981-15-0372-6_17 | en_US |
dc.identifier.uri | http://repository.futminna.edu.ng:8080/jspui/handle/123456789/11673 | - |
dc.description.abstract | Malware is malicious code that tends to take control of the system remotely. The author of these codes drops their malicious payload on to the vul nerable system and continues to maintain access to this system at will. In order to unravel and establish the ability of rootkit to hide system network interface, we developed a network model, and implementation of this model was carried out on four notable live rootkits. Our results show the ability of the four rootkits to hide the system network interfaces, which are being used by the attackers to gain access and communicate correctly with the compromised system. | en_US |
dc.language.iso | en | en_US |
dc.publisher | Advances in Data Sciences, Security and Applications (Springer) | en_US |
dc.relation.ispartofseries | Volume 612; | - |
dc.subject | Malware · Malicious code · Network interface · Rootkit | en_US |
dc.title | An Experimental Approach to Unravel Effects of Malware on System Network Interface | en_US |
dc.type | Book chapter | en_US |
Appears in Collections: | Cyber Security Science |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
An Experimental Approach to Unravel.pdf | 43.31 kB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.