ARCHIVES

Original Article

Rootkit Detecting Application

Sethulakshmi1 Raja Dhurai S2
1M. sc., CFIS, Department of Computer Science and Engineering, Dr. MGR University, Chennai, Tamilnadu, India. 2Faculty. Centre for cyber forensics and information security, university of madras, Chennai, Tamilnadu, India.

Published Online: January-April 2025

Pages: 171-175

References

1. Douceur, L. A. (2022). Rootkit Detection and Mitigation. https://www.acs.com/rootkit-detection
2. Chandramouli, R. (2009). A Survey of Rootkit Detection
Techniques.https://www.researchgate.net/publication/228387435_A_Survey_of_Rootkit_Detection_Techniques/
3. Zhang, Y. (2014). Rootkit Detection Techniques. https://www.cs.ucsb.edu/research/rootkit-detection techniques
4. Meena, M. I. N. (2010). Rootkit Detection: From Theory to Practice. https://dl.acm.org/doi/10.1145/1603614.1603617
5. Rootkit Hunter Development Team (2018). The Rootkit Hunter Tool. https://sourceforge.net/projects/rootkit hunter/.
6. Brion, D. J. (2005). Linux Rootkit Detection with CheckRoot. https://www.linuxjournal.com/article/6823
7. Han, J. W. (2014). System Monitoring and Rootkit Detection. https://ieeexplore.ieee.org/document/6958672
8. Chien, C. H. (2016). Rootkit Detection Using Machine Learning. https://www.sciencedirect.com/science/article/abs/pii/S1877050915000917
9. Smith, J. D. (2013). Detecting Kernel Rootkits Using Behavioural Patterns. https://dl.acm.org/doi/10.1145/1917816.1917817
10. Burns, J. B. (2021). Combating Rootkits: Techniques and Tools. https://www.csoonline.com/article/2062201/combating-rootkits-techniques-
and-tools.html
11. Wong, B. (2013). Rootkit Analysis and Detection. https://www.securityfocus.com/infocus/1767
12. Kumar, S. P. (2020). Detecting and Preventing Rootkits Using Hybrid Techniques. https://www.journals.elsevier.com/journal-of-computer-
security
13. Ransome, M. J. (2007). Rootkits: A Hidden Threat. https://www.amazon.com/Rootkits-Hidden-Greg Shipley/dp/0132329865/14. Tharwat, M. S. A. (2020). Volatility Framework for Rootkit Detection. https://www.volatilityfoundation.org/
15. Jones, L. (2017). Practical Rootkit Detection with SELinux. https://www.redhat.com/en/topics/security/selinux
16. Gupta, P. (2016). Rootkit Detection Using Heuristic Analysis. https://www.sciencedirect.com/science/article/abs/pii/S1877050915000917
17. Patel, A. (2019). Rootkit Defense in Windows Environments. https://docs.microsoft.com/en us/mem/windows- security/rootkits-and-
malware/
18. Lee, L. S. (2021). Advanced Rootkit Detection for Modern Operating Systems. https://www.springer.com/gp/book/9783030609457
19. Maximus, R. F. (2017). Kstat: Kernel Rootkit Detection Tool. https://github.com/sinksmell/kstat
20. Tranter, B. A. (2018). Rootkit Detection Using Integrity Checking. https://www.cert.org/

Related Articles

2025

Transforming Cyber-Physical Systems: Machine Learning for Secure and Efficient Solutions

2025

Exploring AI Techniques for Quantum Threat Detection and Prevention

2025

Maturity Models for Business Intelligence: An Overview

2025

INSPIRO: An AI Driven Institution Auditor

2025

Adaptive AI Framework for Anomaly Detection and DDoS Mitigation in Distributed Systems

2025

Predictive Modeling for College Admission Using Machine Learning and Statistical Methods

Share Article

X
LinkedIn
Facebook
WhatsApp

Or copy link

https://test.indjcst.com/archives/10.59256/indjcst.20250401026

*Instagram doesn't support direct link sharing from web. Copy the link and share it in your Instagram story or post.