Host-based Intrusion Prevention Systems


If you’ve read this book, you already know that a well-written rootkit will not be detected by anti-virus software. And if you’ve looked at the browser exploit in Chapter 11, you already know how easy it is to insert a rootkit onto a machine through a web page. These two circumstances should lead to the conclusion that rootkit prevention requires security enhancements not offered by conventional security software. Fortunately, a recently developed field of security, host-based intrusion prevention systems, or HIPS, can be used to prevent intrusion by hardening, virtualizing, or blocking unexpected operations.




Professional Rootkits
Professional Rootkits (Programmer to Programmer)
ISBN: 0470101547
EAN: 2147483647
Year: 2007
Pages: 229
Authors: Ric Vieler

Similar book on Amazon
Rootkits: Subverting the Windows Kernel
Rootkits: Subverting the Windows Kernel
A Guide to Kernel Exploitation: Attacking the Core
A Guide to Kernel Exploitation: Attacking the Core
Reversing: Secrets of Reverse Engineering
Reversing: Secrets of Reverse Engineering
Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code
Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net