DocumentCode
814646
Title
Detecting and categorizing kernel-level rootkits to aid future detection
Author
Levine, John G. ; Grizzard, Julian B. ; Owen, Henry L.
Author_Institution
Georgia Inst. of Technol., Atlanta, GA, USA
Volume
4
Issue
1
fYear
2006
Firstpage
24
Lastpage
32
Abstract
Existing techniques to detect kernel-level rootkits expose some infections, but they don´t identify specific attacks. This rootkit categorization approach helps system administrators identify the extent of specific infections, aiding in optimal recovery and faster reactions to future attacks. The authors present a framework to detect and classify rootkits and discuss a methodology for determining if a system has been infected by a kernel-level rootkit. Once infection is established, administrators can create new signatures for kernel-level rootkits to detect them. The authors conducted their research on a Red Hat Linux-based system, but the methodology is applicable to other Linux distributions based on the standard Linux kernel. They also believe the method can apply to other Unix- and Windows-based systems.
Keywords
computer viruses; operating system kernels; security of data; Red Hat Linux; kernel-level rootkit classification; kernel-level rootkit detection; Computer security; Control systems; Data structures; File systems; Kernel; Linux; Memory management; Privacy; Read-write memory; Invasive software; rootkit; rootkits;
fLanguage
English
Journal_Title
Security & Privacy, IEEE
Publisher
ieee
ISSN
1540-7993
Type
jour
DOI
10.1109/MSP.2006.11
Filename
1588822
Link To Document