ARCHIVES
Original Article
Rootkit Detecting Application
Sethulakshmi1
Raja Dhurai S2
1M. sc., CFIS, Department of Computer Science and Engineering, Dr. MGR University, Chennai, Tamilnadu, India. 2Faculty. Centre for cyber forensics and information security, university of madras, Chennai, Tamilnadu, India.
Published Online: January-April 2025
Pages: 171-175
Cite this article
↗ https://www.doi.org/10.59256/indjcst.20250401026References
1. Douceur, L. A. (2022). Rootkit Detection and Mitigation. https://www.acs.com/rootkit-detection
2. Chandramouli, R. (2009). A Survey of Rootkit Detection
Techniques.https://www.researchgate.net/publication/228387435_A_Survey_of_Rootkit_Detection_Techniques/
3. Zhang, Y. (2014). Rootkit Detection Techniques. https://www.cs.ucsb.edu/research/rootkit-detection techniques
4. Meena, M. I. N. (2010). Rootkit Detection: From Theory to Practice. https://dl.acm.org/doi/10.1145/1603614.1603617
5. Rootkit Hunter Development Team (2018). The Rootkit Hunter Tool. https://sourceforge.net/projects/rootkit hunter/.
6. Brion, D. J. (2005). Linux Rootkit Detection with CheckRoot. https://www.linuxjournal.com/article/6823
7. Han, J. W. (2014). System Monitoring and Rootkit Detection. https://ieeexplore.ieee.org/document/6958672
8. Chien, C. H. (2016). Rootkit Detection Using Machine Learning. https://www.sciencedirect.com/science/article/abs/pii/S1877050915000917
9. Smith, J. D. (2013). Detecting Kernel Rootkits Using Behavioural Patterns. https://dl.acm.org/doi/10.1145/1917816.1917817
10. Burns, J. B. (2021). Combating Rootkits: Techniques and Tools. https://www.csoonline.com/article/2062201/combating-rootkits-techniques-
and-tools.html
11. Wong, B. (2013). Rootkit Analysis and Detection. https://www.securityfocus.com/infocus/1767
12. Kumar, S. P. (2020). Detecting and Preventing Rootkits Using Hybrid Techniques. https://www.journals.elsevier.com/journal-of-computer-
security
13. Ransome, M. J. (2007). Rootkits: A Hidden Threat. https://www.amazon.com/Rootkits-Hidden-Greg Shipley/dp/0132329865/14. Tharwat, M. S. A. (2020). Volatility Framework for Rootkit Detection. https://www.volatilityfoundation.org/
15. Jones, L. (2017). Practical Rootkit Detection with SELinux. https://www.redhat.com/en/topics/security/selinux
16. Gupta, P. (2016). Rootkit Detection Using Heuristic Analysis. https://www.sciencedirect.com/science/article/abs/pii/S1877050915000917
17. Patel, A. (2019). Rootkit Defense in Windows Environments. https://docs.microsoft.com/en us/mem/windows- security/rootkits-and-
malware/
18. Lee, L. S. (2021). Advanced Rootkit Detection for Modern Operating Systems. https://www.springer.com/gp/book/9783030609457
19. Maximus, R. F. (2017). Kstat: Kernel Rootkit Detection Tool. https://github.com/sinksmell/kstat
20. Tranter, B. A. (2018). Rootkit Detection Using Integrity Checking. https://www.cert.org/
2. Chandramouli, R. (2009). A Survey of Rootkit Detection
Techniques.https://www.researchgate.net/publication/228387435_A_Survey_of_Rootkit_Detection_Techniques/
3. Zhang, Y. (2014). Rootkit Detection Techniques. https://www.cs.ucsb.edu/research/rootkit-detection techniques
4. Meena, M. I. N. (2010). Rootkit Detection: From Theory to Practice. https://dl.acm.org/doi/10.1145/1603614.1603617
5. Rootkit Hunter Development Team (2018). The Rootkit Hunter Tool. https://sourceforge.net/projects/rootkit hunter/.
6. Brion, D. J. (2005). Linux Rootkit Detection with CheckRoot. https://www.linuxjournal.com/article/6823
7. Han, J. W. (2014). System Monitoring and Rootkit Detection. https://ieeexplore.ieee.org/document/6958672
8. Chien, C. H. (2016). Rootkit Detection Using Machine Learning. https://www.sciencedirect.com/science/article/abs/pii/S1877050915000917
9. Smith, J. D. (2013). Detecting Kernel Rootkits Using Behavioural Patterns. https://dl.acm.org/doi/10.1145/1917816.1917817
10. Burns, J. B. (2021). Combating Rootkits: Techniques and Tools. https://www.csoonline.com/article/2062201/combating-rootkits-techniques-
and-tools.html
11. Wong, B. (2013). Rootkit Analysis and Detection. https://www.securityfocus.com/infocus/1767
12. Kumar, S. P. (2020). Detecting and Preventing Rootkits Using Hybrid Techniques. https://www.journals.elsevier.com/journal-of-computer-
security
13. Ransome, M. J. (2007). Rootkits: A Hidden Threat. https://www.amazon.com/Rootkits-Hidden-Greg Shipley/dp/0132329865/14. Tharwat, M. S. A. (2020). Volatility Framework for Rootkit Detection. https://www.volatilityfoundation.org/
15. Jones, L. (2017). Practical Rootkit Detection with SELinux. https://www.redhat.com/en/topics/security/selinux
16. Gupta, P. (2016). Rootkit Detection Using Heuristic Analysis. https://www.sciencedirect.com/science/article/abs/pii/S1877050915000917
17. Patel, A. (2019). Rootkit Defense in Windows Environments. https://docs.microsoft.com/en us/mem/windows- security/rootkits-and-
malware/
18. Lee, L. S. (2021). Advanced Rootkit Detection for Modern Operating Systems. https://www.springer.com/gp/book/9783030609457
19. Maximus, R. F. (2017). Kstat: Kernel Rootkit Detection Tool. https://github.com/sinksmell/kstat
20. Tranter, B. A. (2018). Rootkit Detection Using Integrity Checking. https://www.cert.org/
Related Articles
2025
Transforming Cyber-Physical Systems: Machine Learning for Secure and Efficient Solutions
2025
Exploring AI Techniques for Quantum Threat Detection and Prevention
2025
Maturity Models for Business Intelligence: An Overview
2025
INSPIRO: An AI Driven Institution Auditor
2025
Adaptive AI Framework for Anomaly Detection and DDoS Mitigation in Distributed Systems
2025