• DocumentCode
    814646
  • Title

    Detecting and categorizing kernel-level rootkits to aid future detection

  • Author

    Levine, John G. ; Grizzard, Julian B. ; Owen, Henry L.

  • Author_Institution
    Georgia Inst. of Technol., Atlanta, GA, USA
  • Volume
    4
  • Issue
    1
  • fYear
    2006
  • Firstpage
    24
  • Lastpage
    32
  • Abstract
    Existing techniques to detect kernel-level rootkits expose some infections, but they don´t identify specific attacks. This rootkit categorization approach helps system administrators identify the extent of specific infections, aiding in optimal recovery and faster reactions to future attacks. The authors present a framework to detect and classify rootkits and discuss a methodology for determining if a system has been infected by a kernel-level rootkit. Once infection is established, administrators can create new signatures for kernel-level rootkits to detect them. The authors conducted their research on a Red Hat Linux-based system, but the methodology is applicable to other Linux distributions based on the standard Linux kernel. They also believe the method can apply to other Unix- and Windows-based systems.
  • Keywords
    computer viruses; operating system kernels; security of data; Red Hat Linux; kernel-level rootkit classification; kernel-level rootkit detection; Computer security; Control systems; Data structures; File systems; Kernel; Linux; Memory management; Privacy; Read-write memory; Invasive software; rootkit; rootkits;
  • fLanguage
    English
  • Journal_Title
    Security & Privacy, IEEE
  • Publisher
    ieee
  • ISSN
    1540-7993
  • Type

    jour

  • DOI
    10.1109/MSP.2006.11
  • Filename
    1588822