A Method for Detecting Linux Kernel Module Rootkits

نویسندگان

  • Doug Wampler
  • James Graham
چکیده

There are a variety of methods available to detect modern Linux kernel module rootkits. However, most existing methods rely on system specific a priori knowledge for full detection functionality. Either (a) some application must be installed when the system is deployed, as is typical with host based intrusion detection, or (b) system metrics must be saved to a secure location when the system is deployed, or (c) both of these actions must be performed. It is noted, however, that some of these methods do offer partial functionality when installed on an already infected system. This paper proposes a technique to detect Linux Kernel Module (LKM) rootkits that does not require system specific a priori knowledge, but rather just knowledge about the Linux operating system in general. This technique relies on outlier analysis and statistical techniques, is more formal and rigorous than most existing detection methods, and initial results indicate that Linux Kernel Module rootkit detection is possible with a high degree of confidence.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Shepherding Loadable Kernel Modules through On-demand Emulation

Despite many advances in system security, rootkits remain a threat to major operating systems. First, this paper discusses why kernel integrity verification is not sufficient to counter all types of kernel rootkits and a confidentiality-violation rootkit is demonstrated to evade all integrity verifiers. Then, the paper presents, DARK, a rootkit prevention system that tracks a suspicious loadabl...

متن کامل

Detecting kernel rootkits

Kernel rootkits are a special category of malware that are deployed directly in the kernel and hence have unmitigated reign over the functionalities of the kernel itself. We seek to detect such rootkits that are deployed in the real world by first observing how the majority of kernel rootkits operate. To this end, comparable to how rootkits function in the real world, we write our own kernel ro...

متن کامل

Autoscopy: Detecting Pattern-Searching Rootkits via Control Flow Tracing

Traditional approaches to rootkit detection [24] [45] [25] [34] assume the execution of code at a privilege level below that of the operating system kernel, with the use of virtual machine technologies to enable the detection system itself to be immune from the virus or rootkit code. In this thesis, we approach the problem of rootkit detection from the standpoint of tracing and instrumentation ...

متن کامل

Guest-Transparent Prevention of Kernel Rootkits with VMM-Based Memory Shadowing

Kernel rootkits pose a significant threat to computer systems as they run at the highest privilege level and have unrestricted access to the resources of their victims. Many current efforts in kernel rootkit defense focus on the detection of kernel rootkits – after a rootkit attack has taken place, while the smaller number of efforts in kernel rootkit prevention exhibit limitations in their cap...

متن کامل

Countering Persistent Kernel Rootkits through Systematic Hook Discovery

Kernel rootkits, as one of the most elusive types of malware, pose significant challenges for investigation and defense. Among the most notable are persistent kernel rootkits, a special type of kernel rootkits that implant persistent kernel hooks to tamper with the kernel execution to hide their presence. To defend against them, an effective approach is to first identify those kernel hooks and ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007