JOURNAL ARTICLE

Kernel Rootkit Secret Detection in Cloud Computing

Suresh Kumar ST. Sudalaimuthu

Year: 2022 Journal:   2022 1st International Conference on Computational Science and Technology (ICCST) Vol: 9 Pages: 276-280

Abstract

The internet has become an indispensable part of daily life. Protection on the internet has always been a concern. Malware is used to gain unauthorised access to the target system. Virus, worms, rootkits, Trojan horse, ransomware and so on are the malware. Each malware has its own approach to affect the target system in different ways, thereby causing harm to the system. The rootkit might be in some random files, which when opened can modify or delete the contents or data in the target system. Therefore, we propose a prevention technique for a specific type of malware called Rootkit. The prevention technique in this project uses an algorithm to prevent the opening of the rootkit-affected file as described. In general, the system is comprised of free antivirus software with limited functionality. The proposed model overcomes the functionalities through the use of an algorithm, effectively detecting and preventing rootkit attacks on a system.

Keywords:
Rootkit Malware Computer science Computer security Cryptovirology Hacker Cloud computing Trojan Ransomware The Internet Obfuscation Operating system

Metrics

2
Cited By
0.28
FWCI (Field Weighted Citation Impact)
12
Refs
0.47
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

Advanced Malware Detection Techniques
Physical Sciences →  Computer Science →  Signal Processing
Network Security and Intrusion Detection
Physical Sciences →  Computer Science →  Computer Networks and Communications
Digital and Cyber Forensics
Physical Sciences →  Computer Science →  Information Systems
© 2026 ScienceGate Book Chapters — All rights reserved.