Rootkit detection by using hardware resources to detect inconsistencies in network traffic
Abstract:
A technique allows detection of covert malware that attempts to hide network traffic. By monitoring network traffic both in a secure trusted environment and in an operating system environment, then comparing the monitor data, attempts to hide network traffic can be detected, allowing the possibility of performing rehabilitative actions on the computer system to locate and remove the malware hiding the network traffic.
Information query
Patent Agency Ranking
0/0