alexa Experimental Analysis of Hooks in Virtual Environment
ISSN ONLINE(2319-8753)PRINT(2347-6710)

International Journal of Innovative Research in Science, Engineering and Technology
Open Access

Like us on: https://twitter.com/ijirset_r
OMICS International organises 3000+ Global Conferenceseries Events every year across USA, Europe & Asia with support from 1000 more scientific Societies and Publishes 700+ Open Access Journals which contains over 50000 eminent personalities, reputed scientists as editorial board members.

Open Access Journals gaining more Readers and Citations

700 Journals and 15,000,000 Readers Each Journal is getting 25,000+ Readers

This Readership is 10 times more when compared to other Subscription Journals (Source: Google Analytics)

Special Issue Article

Experimental Analysis of Hooks in Virtual Environment

G.Archana1, S.Suresh Kumar*2 and G.Dinesh3
  1. Student, Department of CSE, Anna University, Rajalakshmi Engineering College, Chennai, Tamilnadu, India
  2. Assistant Professor, Department of CSE, Anna University, KLN Institute of Technology, Madurai, Tamilnadu, India
  3. Associate professor, Department of CSE, Anna University, Rajalakshmi Engineering College, Chennai, Tamilnadu, India
Related article at Pubmed, Scholar Google
 

Abstract

In computing the virtualization means act of creating virtual version. Hardware virtualization is creating of virtual machine with different operating systems. Both Windows and Linux based operating systems may run on virtual machine. Depending, RAM size is allocated. Now days there are many types of malware that affects our system. Malware like Trojan affect the system and then create the backdoor for the system. Then Hackers keeping watching the users’ activity. Root kit (Backdoor) hides the malware activities .Root kit may be of user mode and kernel mode. Root kit enters via dropper (installs malware).BotNet is same as root kit that network of private computers infected malicious code without knowing to administrator. Malware after entering into system modifies kernel by installing backdoors, logging keystrokes and disabling firewalls. The hook has been detected and thus gives the Malware Rating Index, Processor Id and type of hook.

Keywords

Share This Page

Additional Info

Loading
Loading Please wait..
Peer Reviewed Journals
 
Make the best use of Scientific Research and information from our 700 + peer reviewed, Open Access Journals
International Conferences 2017-18
 
Meet Inspiring Speakers and Experts at our 3000+ Global Annual Meetings

Contact Us

 
© 2008-2017 OMICS International - Open Access Publisher. Best viewed in Mozilla Firefox | Google Chrome | Above IE 7.0 version
adwords