Please use this identifier to cite or link to this item:
http://ir.futminna.edu.ng:8080/jspui/handle/123456789/2846
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Subairu, Sikiru Olanrewaju | - |
dc.contributor.author | Alhassan, J. K. | - |
dc.contributor.author | Misra, Sanjay | - |
dc.contributor.author | Abayomi-Alli, Olusola | - |
dc.contributor.author | Ahuja, Ravin | - |
dc.contributor.author | Damasevicius, Robertas | - |
dc.contributor.author | Maskeliunas, Rytis | - |
dc.date.accessioned | 2021-06-12T18:44:12Z | - |
dc.date.available | 2021-06-12T18:44:12Z | - |
dc.date.issued | 2020 | - |
dc.identifier.issn | 978-981-15-0372-6 | - |
dc.identifier.uri | http://repository.futminna.edu.ng:8080/jspui/handle/123456789/2846 | - |
dc.description.abstract | Malware is malicious code that tends to take control of the system remotely. The author of these codes drops their malicious payload on to the vul nerable system and continues to maintain access to this system at will. In order to unravel and establish the ability of rootkit to hide system network interface, we developed a network model, and implementation of this model was carried out on four notable live rootkits. Our results show the ability of the four rootkits to hide the system network interfaces, which are being used by the attackers to gain access and communicate correctly with the compromised system. | en_US |
dc.language.iso | en | en_US |
dc.publisher | Advances in Data Sciences, Security and Applications (Springer) | en_US |
dc.relation.ispartofseries | Volume 612; | - |
dc.subject | Malware · Malicious code · Network interface · Rootkit | en_US |
dc.title | An Experimental Approach to Unravel Effects of Malware on System Network Interface | en_US |
dc.type | Article | en_US |
Appears in Collections: | Computer Science |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
An Experimental Approach to Unravel.pdf | 43.31 kB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.