ارسل ملاحظاتك

ارسل ملاحظاتك لنا







Optimization Of Rootkit Revealing System Resources: A Game Theoretic Approach

المصدر: مجلة جامعة الملك سعود - علوم الحاسب والمعلومات
الناشر: جامعة الملك سعود
المؤلف الرئيسي: Muthumanickam, K. (Author)
مؤلفين آخرين: Ilavarasan, E. (Co-Author)
المجلد/العدد: مج27, ع4
محكمة: نعم
الدولة: السعودية
التاريخ الميلادي: 2015
الصفحات: 386 - 392
DOI: 10.33948/0584-027-004-003
ISSN: 1319-1578
رقم MD: 973717
نوع المحتوى: بحوث ومقالات
اللغة: الإنجليزية
قواعد المعلومات: science
مواضيع:
كلمات المؤلف المفتاحية:
Computer Security | Non Cooperative Game Theory | Rootkit | Resource Optimization | Windows OS
رابط المحتوى:
صورة الغلاف QR قانون
حفظ في:
LEADER 02350nam a22002417a 4500
001 1716573
024 |3 10.33948/0584-027-004-003 
041 |a eng 
044 |b السعودية 
100 |9 525056  |a Muthumanickam, K.  |e Author 
245 |a Optimization Of Rootkit Revealing System Resources: A Game Theoretic Approach 
260 |b جامعة الملك سعود  |c 2015 
300 |a 386 - 392 
336 |a بحوث ومقالات  |b Article 
520 |b Malicious rootkit is a collection of programs designed with the intent of infecting and monitoring the victim computer without the user’s permission. After the victim has been compromised, the remote attacker can easily cause further damage. In order to infect, compromise and monitor, rootkits adopt Native Application Programming Interface (API) hooking technique. To reveal the hidden rootkits, current rootkit detection techniques check different data structures which hold reference to Native APIs. To verify these data structures, a large amount of system resources are required. This is because of the number of APIs in these data structures being quite large. Game theoretic approach is a useful mathematical tool to simulate network attacks. In this paper, a mathematical model is framed to optimize resource consumption using game-theory. To the best of our knowledge, this is the first work to be proposed for optimizing resource consumption while revealing rootkit presence using game theory. Non-cooperative game model is taken to discuss the problem. Analysis and simulation results show that our game theoretic model can effectively reduce the resource consumption by selectively monitoring the number of APIs in windows platform.  
653 |a علوم الحاسوب  |a أم المعلومات  |a نظم التشغيل  |a برامج الحاسوب 
692 |b Computer Security  |b Non Cooperative Game Theory  |b Rootkit  |b Resource Optimization  |b Windows OS 
773 |c 003  |e Journal of King Saud University (Computer and Information Sciences)  |f Maǧalaẗ ǧamʼaẗ al-malīk Saud : ùlm al-ḥasib wa al-maʼlumat  |l 004  |m مج27, ع4  |o 0584  |s مجلة جامعة الملك سعود - علوم الحاسب والمعلومات  |v 027  |x 1319-1578 
700 |9 525057  |a Ilavarasan, E.  |e Co-Author 
856 |u 0584-027-004-003.pdf 
930 |d y  |p y 
995 |a science 
999 |c 973717  |d 973717