作者: Jestin Joy , Anita John
DOI: 10.1007/978-3-642-24043-0_57
关键词: Data mining 、 Host (network) 、 System call 、 Privilege (computing) 、 Kernel (image processing) 、 Computer science 、 Malware 、 Anomaly detection 、 Cluster analysis 、 Rootkit
摘要: Rootkits are a set of software tools used by an attacker to gain unauthorized access into system, thereby providing him with privilege sensitive data, conceal its own existence and allowing install other malicious software. They difficult detect due their elusive nature. Modern rootkit attacks mainly focus on modifying operating system kernel. Existing techniques for detection rely saving the state before comparing it infected state. Efficient is possible properly differentiating non activities taking place in In this paper we present novel anomaly method kernel level rootkits based k-means clustering algorithm.