Please use this identifier to cite or link to this item: http://ir.futminna.edu.ng:8080/jspui/handle/123456789/1987
Full metadata record
DC FieldValueLanguage
dc.contributor.authorAlhassan, J. K.-
dc.contributor.authorSubairu, S. O-
dc.contributor.authorMisra, S-
dc.date.accessioned2021-06-07T19:37:54Z-
dc.date.available2021-06-07T19:37:54Z-
dc.date.issued2016-11-
dc.identifier.citationhttp://www.ijamrs.inen_US
dc.identifier.issn00000000000-
dc.identifier.urihttp://repository.futminna.edu.ng:8080/jspui/handle/123456789/1987-
dc.description.abstractRootkit is a fatal malware devouring user and kernel mode kind which inclines to take complete control of a compromised system by means of various infection and evasion techniques. Several detection algorithms has been offered and joined into the anti rootkit tools with many degree of performance in handling rootkit incidence. There is a severe rise in the rootkit attack with irregular rootkit samples such as, zeroaccess, darkmegi, tdl-4 and xpaj.mbr with each one having different impact on the internal structure of an operating system. Therefore, in this study analysis of rootkits tools were carried out using active detectors tools and malware forensic analysis tools, applying system scanning, network scanning and malware forensic analysis methodology. Altogether the samples rootkit have one or more rootkit detectors to handle their incidence though at a varied performance rate except darkmegi. Though two of the detectors were able to detect its presence on a compromised system, but failed in removal attempten_US
dc.language.isoenen_US
dc.publisherInternational Journal of Advanced Multidisciplinary Research and Studiesen_US
dc.relation.ispartofseriesVolume 1 Number 1;-
dc.subjectRootkits, infection, detectors, detection, network scanning,en_US
dc.titleEvaluating Capabilities of Rootkits Tools.en_US
dc.typeArticleen_US
Appears in Collections:Computer Science

Files in This Item:
File Description SizeFormat 
Evaluating capability of Rootkits.pdf49.07 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.