Novel Implementation of Hybrid Rootkit

Authors

  • Shivani Bhakare

Keywords:

Hybrid rootkit, malware, stealth, security, Trojans, Amazon Web Services

Abstract

Statistics show that although malware detection are detecting and preventing malware, they do not guarantee a 100% detection and/or prevention of malware. This is especially the case when it comes to rootkits that can manipulate the operating system such
that it can distribute other malware, hide existing malware, steal info, hide itself, disable anti-malware software etc. all without the knowledge of the user. This paper will demonstrate that by implementing hybrid rootkits or any other type of malware, a researcher will be able to better understand the techniques and vulnerabilities used by an attacker. Such information could then be useful while implementing anti-malware techniques.

Downloads

Published

2021-01-14

How to Cite

Shivani Bhakare. (2021). Novel Implementation of Hybrid Rootkit. International Journal of Emerging Trends &Amp; Computer Science, 3(2). Retrieved from https://aspirepublishers.com/index.php/ijetcs/article/view/27

Issue

Section

Articles