Explore chapters and articles related to this topic
Design of a Secure Infrastructure for Cognitive IoT Platforms and Applications
Published in Pethuru Raj, Anupama C. Raman, Harihara Subramanian, Cognitive Internet of Things, 2022
Pethuru Raj, Anupama C. Raman, Harihara Subramanian
Hyperjacking enables an attacker to install a rogue hypervisor that has the capability to take complete control of the underlying physical server. This is a rootkit level vulnerability. A rootkit is a malicious program which is installed before a hypervisor fully boots on a physical server. In this manner, the rootkit is able to run in the server with privileged access and remains invisible to the system administrators. Once a rootkit is installed, it gives permission to an attacker to mask the ongoing intrusion and maintain privileged access to the physical server by bypassing the normal authentication and authorization mechanisms which are employed by an OS.
Types of Computer Malware
Published in Kutub Thakur, Al-Sakib Khan Pathan, Cybersecurity Fundamentals, 2020
Kutub Thakur, Al-Sakib Khan Pathan
Rootkit is a type of malware that gets the administrator-level privileges on the OS of the computer without showing its presence on the computer. The main feature of rootkit is that it hides from being detected easily, but maintains the control over the OS to perform its designated tasks on the system. The normal behavior of the OS is subverted by the rootkit malware on the system (Figure 5.3).
Mal_CNN: An Enhancement for Malicious Image Classification Based on Neural Network
Published in Cybernetics and Systems, 2022
P. M. Kavitha, B. Muruganantham
Malware authors have been adopting a variety of approaches to generate malicious and malware variants, involving replicating modules and using automated malware workspaces. Just because a few hazardous functionality modules are reused among malware families, malware variants within the same family may have identical binary patterns that will be used to diagnose malware and classify malware families. Malware examination is the review or cycle of deciding the usefulness, beginning and expected effect of a given malware test like an infection, worm, diversion, rootkit, or secondary passage. Malevolent programming is any PC programming planned to hurt the host working framework or to take touchy information from clients, associations, or organizations. Malware might incorporate programming that assembles client data without authorization. With a fast development in the malware, an improved malware examination is so much needed to end the vindictive exercises, that is, extending step by step. A more precise and profoundly effective model that describes the malware variations is to be introduced for classifying the malwares (Ye et al. 2018). A definitive motto of these informative groupings is that they have multitudinous factors. These parts require a gigantic pile of figuring resources for handle them. Malwares can be identified in various forms. Malwares in image based are highly toughest task for the researchers to detect. Static and dynamic analyses are the two types of analysis technic used in malware analysis. Normally, signature based techniques are used to detect the malwares (Kaur, Pannu, and Malhi 2020). Malwares are abundantly represented. Image based malwares is one kind of malicious representation of malwares. Malware codes have been hidden in the image.