Detecting the Rootkit through Dynamic Analysis
Journal Title: International Journal of Science and Research (IJSR) - Year 2015, Vol 4, Issue 3
Abstract
Network security provides a security for all the programs or files or system. Some attackers attack a programs or files or passwords or other personal details of the user. Like the same way Rootkit is one of the malicious file or a software which attacks a network security and acts an administrator in an absence of the user knowledge. Rootkit virus is stealthy in nature and is installed in the system through a file or a driver or coding. It attacks the system through the kernel-level in the real time. Files are hided through the rootkit in the absence of the user knowledge. They can monitor the other user’s activity when the botnet is installed in the other system. Rootkit allows the attacker through the backdoor. So that attacker can steal the users personal details. Task manager, service and the registry are got destroyed or made changes. The attacker can make any changes at any time. Finally the malicious file and authorized files are distinguished and their accuracy is performed.
Artificial Neural Network Based Speed and Torque Control of Three Phase Induction Motor
Direct Torque Control (DTC) of Induction Motor drive has quick torque response without complex orientation transformation and inner loop current control. DTC has some drawbacks, such as the torque and flux ripple. The co...
Scheduling Virtual Machines for Load balancing in Cloud Computing Platform
Cloud computing enables developers to automatically deploy applications during task allocation and storage distribution by using distributed computing technologies in numerous servers. To gain the maximum benefit from cl...
Effects of Anthropogenic Activities on Distribution and Abundance of the Epiphytic Orchid, Polystachya fusiformis (Thou.) Lindl. in the Manga Range Ecosystem, Kisii, Kenya
It has been observed that anthropogenic activities namely, farming, tree harvesting, seasonal fire regimes, introduction of exotic tree species like Eucalyptus and Greviella, and collection of herbs for medicinal use are...
Survey Paper on Location Privacy Preserving and Finding Optimal Meeting Location using Secured Homomorphism
Equipped with progressive smartphones and mobile devices, today’s extremely interconnected urban population is more and more addicted to these gadgets to prepare and set up their daily lives. These applications usually s...
Revisiting Defenses against Large-Scale Online Password Guessing Attacks
"Abstract: Brute force and dictionary attacks on password-only remote login services are now widespread and ever increasing rapidly in Day to day life. Enabling users convenient login for legitimate user...