ARCHIVES
Rootkit Detecting Application
¹M. sc., CFIS, Department of Computer Science and Engineering, Dr. MGR University, Chennai, Tamilnadu, India. ²Faculty. Centre for cyber forensics and information security, university of madras, Chennai, Tamilnadu, India.
Published Online: January-April 2025
Pages: 171-175
Cite this article
↗ https://www.doi.org/10.59256/indjcst.20250401026Rootkits are malicious software designed to conceal the presence of unauthorized access to a computer system. Detecting rootkits is challenging due to their ability to evade traditional security mechanisms. This project proposes a novel rootkit detection technique based on behavioural analysis, security log analysis and anomaly detection. The approach Uses such an algorithm that baselines system behaviour and identify deviations indicative of rootkit activity. Key features include dynamic analysis of system calls, file system interactions, and network traffic patterns. Evaluation results demonstrate the effectiveness of the proposed method in detecting both known and novel rootkits with high accuracy and low false positives.
Related Articles
2025
Enhanced Maritime Surveillance Detecting Intentional AIS Shutdown in Open Seas Using Hybrid Self- Supervised Deep Learning and Anomaly Detection
2025
Rootkit Detecting Application
2025
The Applications of Chat GPT in Computer Software Education
2025
Design and Evaluation of a Multi-Tenant SaaS Platform for Scalable and Secure Application Delivery
2025
Blockchain Technology in Healthcare: Applications, Benefits, Challenges, and Future Prospects
2025
An Enhanced Hybrid Machine Learning Model for Detecting DoS Attacks in IoT Network
2025
Med-Assist: An AI-Powered Medical Web Application with Chatbot
2025
Fundamentals and Applications of Blockchain Technology
2025
Blockchain enabled Cybersecurity: Concepts, Applications and Future Directions


