ARCHIVES

Original Article

Rootkit Detecting Application

Sethulakshmi1Raja Dhurai S2

¹M. sc., CFIS, Department of Computer Science and Engineering, Dr. MGR University, Chennai, Tamilnadu, India. ²Faculty. Centre for cyber forensics and information security, university of madras, Chennai, Tamilnadu, India.

Published Online: January-April 2025

Pages: 171-175

Abstract

Rootkits are malicious software designed to conceal the presence of unauthorized access to a computer system. Detecting rootkits is challenging due to their ability to evade traditional security mechanisms. This project proposes a novel rootkit detection technique based on behavioural analysis, security log analysis and anomaly detection. The approach Uses such an algorithm that baselines system behaviour and identify deviations indicative of rootkit activity. Key features include dynamic analysis of system calls, file system interactions, and network traffic patterns. Evaluation results demonstrate the effectiveness of the proposed method in detecting both known and novel rootkits with high accuracy and low false positives.

Related Articles

2025

Enhanced Maritime Surveillance Detecting Intentional AIS Shutdown in Open Seas Using Hybrid Self- Supervised Deep Learning and Anomaly Detection

2025

Rootkit Detecting Application

2025

The Applications of Chat GPT in Computer Software Education

2025

Design and Evaluation of a Multi-Tenant SaaS Platform for Scalable and Secure Application Delivery

2025

Blockchain Technology in Healthcare: Applications, Benefits, Challenges, and Future Prospects

2025

An Enhanced Hybrid Machine Learning Model for Detecting DoS Attacks in IoT Network

2025

Med-Assist: An AI-Powered Medical Web Application with Chatbot

2025

Fundamentals and Applications of Blockchain Technology

2025

Blockchain enabled Cybersecurity: Concepts, Applications and Future Directions

Rootkit Detecting Application | INDJCST | INDJCST