參考文獻 |
[1] B. Cinar and Jasmin Praful Bharadiya, “Cloud Computing Forensics; Challenges and Future Perspectives: A Review,” Asian Journal of Research in Computer Science, vol. 16, no. 1, pp. 1–14, May 2023, doi: https://doi.org/10.9734/ajrcos/2023/v16i1330.
[2] M. Nadim, W. Lee, and D. Akopian, “Kernel-level Rootkit Detection, Prevention and Behavior Profiling: A Taxonomy and Survey,” arXiv.org, Apr. 02, 2023.
https://arxiv.org/abs/2304.00473 (accessed Jul. 22, 2023).
[3] U. A. Butt, R. Amin, M. Mehmood, H. Aldabbas, M. T. Alharbi, and N. Albaqami, “Cloud Security Threats and Solutions: A Survey,” Wireless Personal Communications, vol. 128, no. 1, Sep. 2022, doi: https://doi.org/10.1007/s11277-022-09960-z.
[4] Z. Aalam, V. Kumar, and S. Gour, “A Review Paper on Hypervisor and Virtual Machine Security,” Journal of Physics: Conference Series, vol. 1950, no. 1, p. 012027, Aug. 2021, doi: https://doi.org/10.1088/1742-6596/1950/1/012027.
[5] Ö. Aslan, S. S. Aktuğ, M. Ozkan-Okay, A. A. Yilmaz, and E. Akin, “A Comprehensive Review of Cyber Security Vulnerabilities, Threats, Attacks, and Solutions,” Electronics, vol. 12, no. 6, p. 1333, Mar. 2023, doi: https://doi.org/10.3390/electronics12061333.
[6] F. Xiao, Z. Yang, J. Allen, G. Yang, G. Williams, and W. Lee, “Understanding and Mitigating Remote Code Execution Vulnerabilities in Cross-platform Ecosystem,”
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, Nov. 2022, doi: https://doi.org/10.1145/3548606.3559340.
[7] V. Dakić, K. Jakobovic, and L. Zgrablic, “Linux Security in Physical, Virtual, and Cloud Environments,” 33rd International DAAAM Virtual Symposium on Intelligent Manufacturing & Automation, pp. 0151–0160, Jan. 2022, doi: https://doi.org/10.2507/33rd.daaam.proceedings.021.
[8] D. Soldani, P. Nahi, H. Bour, S. Jafarizadeh, Mohammed F. Soliman, Leonardo Di Giovanna, F. Monaco, G. Ognibene, and F. Risso “eBPF: A New Approach to Cloud-Native Observability, Networking and Security for Current (5G) and Future Mobile Networks (6G and Beyond),” IEEE Access, vol. 11, pp. 57174–57202,
2023, doi: https://doi.org/10.1109/ACCESS.2023.3281480.
[9] Red Hat. “State of Linux in the Public Cloud” Accessed on: Feb 20, 2024.
[Online]. Available: https://www.redhat.com/en/resources/state-of-linux-publiccloud-solutions-ebook.
[10] Red Hat. “Linux for Cloud Computing” Accessed on: Apr 11, 2024. [Online].
Available: https://www.redhat.com/en/topics/linux/linux-for-cloud-computing.
[11] statcounter. “Desktop, Tablet & Console Operating System Market Share
Worldwide. Jan - Dec 2023” Accessed on: May 4, 2024. [Online]. Available: https://gs.statcounter.com/os-market-share/desktop-tablet-console/worldwide.
[12] It’s FOSS. “Oomputers, Again!” Accessed on: Mar 26, 2024. [Online]. Available: https://itsfoss.com/linux-runs-top-supercomputers.
[13] QUICKSTART. “Why Linux Runs 90 Percent of the Public Cloud Workload” Accessed on: Apr 26, 2024. [Online]. Available: https://www.quickstart.com/blog/why-linux-runs-90-percent-of-the-public-cloudworkload.
[14] SEALEVEL. “The Top Three Reasons Linux is Running the World’s Supercomputers” Accessed on: Jan 9, 2024. [Onlinne]. Available: https://www.sealevel.com/2022/09/13/linux-os.
[15] AV-TEST. “New Malware Samples by Operating System (2021 vs 2022)” Access on: May 19, 2024. [Online]. Available: https://atlasvpn.com/blog/new-linuxmalware-hits-record highs-in-2022-rising-by-50.
[16] The Linux Kernel Archives. “Symbol Namespaces” Accessed on: May 14, 2024.
[Onlinne]. Available: https://docs.kernel.org/coreapi/symbol-namespaces.html.
[17] The Linux Kernel Archives. “The /proc Filesystem” Accessed on: May 16, 2024.
[Onlinne]. Available: https://docs.kernel.org/filesystems/proc.html.
[18] M. Nadim, D. Akopian, and W. Lee, “A Review on Learning-based Detection Approaches of the Kernel-level Rootkit,” IEEE Xplore, Oct. 01, 2021. https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=9659710.
[19] S. Suresh Kumar and T. SudalaiMuthu, “Advance Kernel Rootkit Detection: Survey,” 2023 7th International Conference on Intelligent Computing and Control
Systems (ICICCS), May 2023, doi: https://doi.org/10.1109/iciccs56967.2023.10142360.
[20] Y. Li, T. Zhai, B. Wu, Y. Jiang, Z. Li, and S.-T. Xia, “Rethinking the Trigger of Backdoor Attack,” arXiv (Cornell University), Jan. 2020, doi: https://doi.org/10.48550/arxiv.2004.04692.
[21] H. Sharaf, I. Ahmad, and T. Dimitriou, “Extended Berkeley Packet Filter: An Application Perspective,” IEEE Access, vol. 10, pp. 126370–126393, 2022, doi: https://doi.org/10.1109/access.2022.3226269.
[22] The Linux Kernel Archives. “Using the Linux Kernel Tracepoints” Accessed on: Mar 8, 2024. [Online]. Available: https://docs.kernel.org/trace/kprobes.html.
[23] The Linux Kernel Archives. “Kernel Probes (Kprobes)” Accessed on: Mar 9, 2024. [Online]. Available: https://docs.kernel.org/trace/kprobes.html.
[24] M. Boelen. “rkhunter” Accessed on: May 26, 2024. [Online]. Available: https://rkhunter.sourceforge.net.
[25] H. Handschuh, “SHA Family (Secure Hash Algorithm),” Encyclopedia of Cryptography and Security, pp. 565–567, 2020, doi: https://doi.org/10.1007/0-387-23483-7_388.
[26] B. Noor and S. Qadir, “Machine Learning and Deep Learning Based Model for the Detection of Rootkits Using Memory Analysis,” Applied Sciences, vol. 13, no. 19, p. 10730, Sep. 2023, doi: https://doi.org/10.3390/app131910730.
[27] I. H. Sarker, “Machine Learning: Algorithms, Real-World Applications and Research Directions,” SN Computer Science, vol. 2, no. 3, pp. 1–21, Mar. 2021,
doi: https://doi.org/10.1007/s42979-021-00592-x.
[28] S. Dong, P. Wang, and K. Abbas, “A Survey on Deep Learning and its
Applications,” Computer Science Review, vol. 40, p. 100379, May 2021, doi:
https://doi.org/10.1016/j.cosrev.2021.100379.
[29] A. Antoniadis, S. Lambert-Lacroix, and J.-M. Poggi, “Random Forests for Global
Sensitivity Analysis: A Selective Review,” Reliability Engineering & System
Safety, vol. 206, p. 107312, Feb. 2021, doi:
https://doi.org/10.1016/j.ress.2020.107312.
[30] P. Cunningham and S. J. Delany, “k-Nearest Neighbour Classifiers - A Tutorial,”
ACM Computing Surveys, vol. 54, no. 6, pp. 1–25, Jul. 2021, doi: https://doi.org/10.1145/3459665.
[31] N. A. Priyanka and D. Kumar, “Decision Tree Classifier: A Detailed Survey,”
International Journal of Information and Decision Sciences, vol. 12, no. 3, p. 246,
2020, doi: https://doi.org/10.1504/ijids.2020.108141.
[32] D. A. Pisner and D. M. Schnyer, “Support Vector Machine,” Machine Learning,
pp. 101–121, 2020, doi: https://doi.org/10.1016/b978-0-12-815739-8.00006-7.
[33] A. Graves, “Long Short-Term Memory,” Studies in Computational Intelligence,
vol. 385, pp. 37–45, 2012, doi: https://doi.org/10.1007/978-3-642-24797-2_4.
[34] P. Pandiaraja, K. Muthumanickam, and R. Palani Kumar, “A Graph-Based Model
for Discovering Host-Based Hook Attacks,” Smart Technologies in Data Science
and Communication pp. 1–13, Jan. 2023, doi: https://doi.org/10.1007/978-981-19-
6880-8_1.
[35] A. Mohanta and A. Saldanha, “Code Injection, Process Hollowing, and API
Hooking,” Malware Analysis and Detection Engineering, pp. 267–329, 2020, doi:
https://doi.org/10.1007/978-1-4842-6193-4_10.
[36] Y. Lu, D.-L. Zhang, C.-P. Hu, K.-L. Zhu, Y. Zhuang, and L.-N. Shi, “Rootkit
Detection Mechanisms for Linux Systems,” 2023 9th International Conference on
Computer and Communications (ICCC) Dec. 2023, doi:
https://doi.org/10.1109/iccc59590.2023.10507534.
[37] M. Y. Hsieh, “Using Virtual Machine Introspection to Detect Hidden Behavior of
DKOM-Rootkit in Cloud Environment” National Central University, Accessed on:
Jan 6, 2024. [Online]. Available: https://hdl.handle.net/11296/tjuq8m.
[38] D. Kapil and P. Mishra, “Virtual Machine Introspection in Virtualization: A
Security Perspective,” 2021 Thirteenth International Conference on Contemporary
Computing (IC3-2021), Aug. 2021, doi: https://doi.org/10.1145/3474124.3474140.
[39] B. Taubmann and H. P. Reiser, “Towards Hypervisor Support for Enhancing the
Performance of Virtual Machine Introspection,” Lecture notes in computer science, pp. 41–54, Jan. 2020, doi: https://doi.org/10.1007/978-3-030-50323-9_3.
[40] Github. “libbpf” Accessed on: Mar 28, 2024. [Online]. Available: https://github.com/libbpf/libbpf.
[41] Github. “hyperfine” Accessed on: Mar 28, 2024. [Online]. Available: https://github.com/sharkdp/hyperfine.
[42] Github. “byte-unixbench” Accessed on: Mar 28, 2024. [Online]. Available: https://github.com/kdlucas/byte-unixbench/tree/master.
[43] Github. “Diamorphine” Accessed on: Mar 23, 2024. [Online]. Available: https://github.com/m0nad/Diamorphine.
[44] Github. “Reptile” Accessed on: Jan 18, 2024. [Online]. Available: https://github.com/f0rb1dd3n/Reptile.
[45] Github. “rootkit” Accessed on: Jan 18, 2024. [Online]. Available:
https://github.com/plusls/rootkit.
[46] Github. “linux_kernel_hacking” Accessed on: Jan 23, 2024. [Online]. Available: https://github.com/xcellerator/linux_kernel_hacking.
[47] iperf, “iperf” Accessed on July 12, 2024. [Online]. Available: https://iperf.fr.
[48] GeeksForGeeks. “Introduction to Semantic Versioning” Accessed on: Jan 23, 2024. [Online]. Available: https://www.geeksforgeeks.org/introduction-semanticversioning |