ARCHIVES

Original Article

Rootkit Detecting Application

Sethulakshmi1 Raja Dhurai S2
1M. sc., CFIS, Department of Computer Science and Engineering, Dr. MGR University, Chennai, Tamilnadu, India. 2Faculty. Centre for cyber forensics and information security, university of madras, Chennai, Tamilnadu, India.

Published Online: January-April 2025

Pages: 171-175

Abstract

Rootkits are malicious software designed to conceal the presence of unauthorized access to a computer system. Detecting rootkits is challenging due to their ability to evade traditional security mechanisms. This project proposes a novel rootkit detection technique based on behavioural analysis, security log analysis and anomaly detection. The approach Uses such an algorithm that baselines system behaviour and identify deviations indicative of rootkit activity. Key features include dynamic analysis of system calls, file system interactions, and network traffic patterns. Evaluation results demonstrate the effectiveness of the proposed method in detecting both known and novel rootkits with high accuracy and low false positives.

Related Articles

2025

Transforming Cyber-Physical Systems: Machine Learning for Secure and Efficient Solutions

2025

Exploring AI Techniques for Quantum Threat Detection and Prevention

2025

Maturity Models for Business Intelligence: An Overview

2025

INSPIRO: An AI Driven Institution Auditor

2025

Adaptive AI Framework for Anomaly Detection and DDoS Mitigation in Distributed Systems

2025

Predictive Modeling for College Admission Using Machine Learning and Statistical Methods

Share Article

X
LinkedIn
Facebook
WhatsApp

Or copy link

https://test.indjcst.com/archives/10.59256/indjcst.20250401026

*Instagram doesn't support direct link sharing from web. Copy the link and share it in your Instagram story or post.