Please use this identifier to cite or link to this item: http://ir.futminna.edu.ng:8080/jspui/handle/123456789/2846
Full metadata record
DC FieldValueLanguage
dc.contributor.authorSubairu, Sikiru Olanrewaju-
dc.contributor.authorAlhassan, J. K.-
dc.contributor.authorMisra, Sanjay-
dc.contributor.authorAbayomi-Alli, Olusola-
dc.contributor.authorAhuja, Ravin-
dc.contributor.authorDamasevicius, Robertas-
dc.contributor.authorMaskeliunas, Rytis-
dc.date.accessioned2021-06-12T18:44:12Z-
dc.date.available2021-06-12T18:44:12Z-
dc.date.issued2020-
dc.identifier.issn978-981-15-0372-6-
dc.identifier.urihttp://repository.futminna.edu.ng:8080/jspui/handle/123456789/2846-
dc.description.abstractMalware is malicious code that tends to take control of the system remotely. The author of these codes drops their malicious payload on to the vul nerable system and continues to maintain access to this system at will. In order to unravel and establish the ability of rootkit to hide system network interface, we developed a network model, and implementation of this model was carried out on four notable live rootkits. Our results show the ability of the four rootkits to hide the system network interfaces, which are being used by the attackers to gain access and communicate correctly with the compromised system.en_US
dc.language.isoenen_US
dc.publisherAdvances in Data Sciences, Security and Applications (Springer)en_US
dc.relation.ispartofseriesVolume 612;-
dc.subjectMalware · Malicious code · Network interface · Rootkiten_US
dc.titleAn Experimental Approach to Unravel Effects of Malware on System Network Interfaceen_US
dc.typeArticleen_US
Appears in Collections:Computer Science

Files in This Item:
File Description SizeFormat 
An Experimental Approach to Unravel.pdf43.31 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.