Volume 9, Issue 3 (9-2017)                   IJICTR 2017, 9(3): 17-24 | Back to browse issues page

XML Print

Download citation:
BibTeX | RIS | EndNote | Medlars | ProCite | Reference Manager | RefWorks
Send citation to:

salahi A, Enayatizadeh J. Domain Ontology to Distinguish Different Types of Rootkits . IJICTR. 2017; 9 (3) :17-24
URL: http://ijict.itrc.ac.ir/article-1-32-en.html
1- Iran Telecommunication Research Center, ITRC, Tehran, Iran
2- Information Security Department Research Institute for ICT Tehran, Iran
Abstract:   (1491 Views)
Rootkit is an auxiliary tool for sniffing, stealing and hiding, so it has become the key component in almost all successful attacks. Analysis of rootkits will provide system administrators and security software managers the ability to detect and prevent a computer being compromised. Ontology will provide detailed conceptualization to represent the rootkit concepts and its relationships to other security concepts in cyber-attack domain. In this paper we presented an ontology for rootkits which contains many concepts relating to security, cyber-attacks and operating systems. We divided rootkits according to four attributes, and expanded the ontology for rootkits accordingly. This ontology can be used to distinguish different types of rootkits.
Full-Text [PDF 1200 kb]   (836 Downloads)    
Type of Study: Research | Subject: Information Technology

Add your comments about this article : Your username or Email: