ARCHIVES
Rootkit Detecting Application
Published Online: January-April 2025
Pages: 171-175
Cite this article
↗ https://www.doi.org/10.59256/indjcst.20250401026Abstract
Rootkits are malicious software designed to conceal the presence of unauthorized access to a computer system. Detecting rootkits is challenging due to their ability to evade traditional security mechanisms. This project proposes a novel rootkit detection technique based on behavioural analysis, security log analysis and anomaly detection. The approach Uses such an algorithm that baselines system behaviour and identify deviations indicative of rootkit activity. Key features include dynamic analysis of system calls, file system interactions, and network traffic patterns. Evaluation results demonstrate the effectiveness of the proposed method in detecting both known and novel rootkits with high accuracy and low false positives.
Related Articles
2025
Transforming Cyber-Physical Systems: Machine Learning for Secure and Efficient Solutions
2025
Exploring AI Techniques for Quantum Threat Detection and Prevention
2025
Maturity Models for Business Intelligence: An Overview
2025
INSPIRO: An AI Driven Institution Auditor
2025
Adaptive AI Framework for Anomaly Detection and DDoS Mitigation in Distributed Systems
2025