Architecture of our System
To meet the requirements involved, our system architecture includes the following components:
A virtualization layer, using VMware Server, to protect the system and to check multiple pages simultaneously.
A specialized rootkit to modify the operating system and detect the malicious pages.
A Browser Control to manage the rootkit and Internet Explorer as well as to communicate with our management console.
A Management Console to configure and control the entire system.