Study on Information Security Monitoring Framework

Article Preview

Abstract:

As malware has become increasingly sophisticated over the past several years, it is no longer unusual to see it disable critical security services on a victims machine. In our threat model, we assume the attacker can compromise the users OS and any application running inside it. The results show that our threat model makes an introspection assumption stating that the OS and application level data structures in the User VM memory have not been altered, it is still instructive to consider what it would take to perform this type of attack, and the most security critical data is located in the User OS kernel.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

2674-2677

Citation:

Online since:

June 2013

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] P. Kabiri and A. Ghorbani: International Journal on Network Security, Vol.1 (2005), p.84.

Google Scholar

[2] L. Stephen: Communications of the ACM-Wireless sensor networks, Vol.47 (2004), p.25.

Google Scholar

[3] I. Onut and A. S. Ghorbani: Computers and Security, Vol.26 (2007), p.201.

Google Scholar

[4] R. Richardson: CSI Computer Crime and Security Survey, 2008.

Google Scholar