Back to Search
Start Over
Intrusion Prevention Method on LKM (Loadable Kernel Module) Backdoor Attack
- Source :
- DEStech Transactions on Engineering and Technology Research.
- Publication Year :
- 2017
- Publisher :
- DEStech Publications, 2017.
-
Abstract
- The current backdoor program is executed in user mode, which is called application mode, it is possible to find backdoors by the integrity check of system file. However, for the backdoor program is executed in kernel module, it is impossible to find its existence by the integrity check of system file. Current detection system has limitation to detection this LKM (Loadable Kernel Module) backdoor because they just examine the changes on the System Call Table. In this paper, we suggest the method using log file and password to overcome the limitation which the current integrity check system can’t prevent attack using the kernel module.
Details
- ISSN :
- 2475885X
- Database :
- OpenAIRE
- Journal :
- DEStech Transactions on Engineering and Technology Research
- Accession number :
- edsair.doi...........bae1e98d5c1428d0a41da2429aa58569
- Full Text :
- https://doi.org/10.12783/dtetr/icamm2016/7344