Kernel-level Rootkit Detection, Prevention and Behavior Profiling: A Taxonomy and Survey

04/02/2023
by   Mohammad Nadim, et al.
0

One of the most elusive types of malware in recent times that pose significant challenges in the computer security system is the kernel-level rootkits. The kernel-level rootkits can hide its presence and malicious activities by modifying the kernel control flow, by hooking in the kernel space, or by manipulating the kernel objects. As kernel-level rootkits change the kernel, it is difficult for user-level security tools to detect the kernel-level rootkits. In the past few years, many approaches have been proposed to detect kernel-level rootkits. It is not much difficult for an attacker to evade the signature-based kernel-level rootkit detection system by slightly modifying the existing signature. To detect the evolving kernel-level rootkits, researchers have proposed and experimented with many detection systems. In this paper, we survey traditional kernel-level rootkit detection mechanisms in literature and propose a structured kernel-level rootkit detection taxonomy. We have discussed the strength and weaknesses or challenges of each detection approach. The prevention techniques and profiling kernel-level rootkit behavior affiliated literature are also included in this survey. The paper ends with future research directions for kernel-level rootkit detection.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
05/15/2023

Survey of Malware Analysis through Control Flow Graph using Machine Learning

Malware is a significant threat to the security of computer systems and ...
research
01/19/2018

Plagiarism: Taxonomy, Tools and Detection Techniques

To detect plagiarism of any form, it is essential to have broad knowledg...
research
05/08/2023

The Signature Kernel

The signature kernel is a positive definite kernel for sequential data. ...
research
01/29/2021

Peeler: Profiling Kernel-Level Events to Detect Ransomware

Ransomware is a growing threat that typically operates by either encrypt...
research
04/16/2023

A Survey of Access Control Misconfiguration Detection Techniques

Access control mechanisms have been adopted in many real-world systems t...
research
06/29/2022

A Novel Attack to the Permuted Kernel Problem

The Permuted Kernel Problem (PKP) asks to find a permutation of a given ...
research
09/15/2019

A brief TOGAF description using SEMAT Essence Kernel

This work aims to explore the possibility of describing the enterprise a...

Please sign up or login with your details

Forgot password? Click here to reset