Abstract
In order to solve the problems that the high misjudgment ratio of Rootkit detection and undetectable unknown Rootkit in the virtualization guest operating system, a Rootkit detecting model (QNDRM) based on intelligent optimization algorithm was proposed. The detecting model combines neural network with QPSO, which can take advantage of them. In the actual detection, QNDRM firstly captures the previously selected out Rootkitâs typical characteristic behaviors. And then, the trained system detects the presence of Rootkit. The experimental results show that QNDRM can effectively reduce the misjudgment ratio and detect both known and unknown Rootkit.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Vivek, K.: Guide to Cloud Computing for Business and Technology Managers: From Distributed Computing to Cloudware Applications. CRC Press, Boca Raton (2014)
Hoglund, G., Butler, J.: Rootkits: Subverting the Windows Kernel. Addison-Wesley Professional, Reading (2006)
Lu, T.: Research on Malcode Detection Technology Based on Artificial Immune System. Beijing University of Posts and Telecommunications (2013)
Zhang F.: Research on Artificial Immune Algorithms on Malware Detection. South China University of Technology (2012)
Jianfeng, Pan: Design and Implemetation of Host-Based Malcode Detection System. University of Science and Technology of China, Anhui (2009)
Shirazi, H.M.: An intelligent intrusion detection system using genetic algorithms and features selection. Majlesi J. Electr. Eng. 4(1), 33â43 (2010)
Abadeh, M.S., Habibi, J.A.: Hybridization of evolutionary fuzzy systems and ant colony optimization for intrusion detection. ISC Int. J. Inf. Secur. 2(1), 33â46 (2015)
Dastanpour, A., Ibrahim, S., Mashinchi, R.: Using genetic algorithm to supporting artificial neural network for intrusion detection system. In: The International Conference on Computer Security and Digital Investigation (ComSec2014). The Society of Digital Information and Wireless Communication, pp. 1â13 (2014)
Yuan, X., Li, H., Liu, S.: Neural Network and Genetic Algorithm Apply in Water Science. China Water & Power Press, Beijing (2002)
Zhu H.: Intrusion Detection System Research Based on Neural Network. Shandong University (2008)
Wan, T., Ma, J., Zeng, G.: Analysis of sample database for intelligence intrusion detection evaluation. South-Central Univ. Nationalities 2(29), 84â87 (2010)
Debar, H., Becker, M., Siboni, D.: A neural network component for an intrusion detection system. In: Proceedings of the 1992 IEEE Computer Society Symposium on Research in Security and Privacy, pp. 240â250. IEEE (1992)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
Âİ 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Sun, L., Zhao, Z., Wang, F., Jin, L. (2015). Research on Rootkit Detection Model Based on Intelligent Optimization Algorithm in the Virtualization Environment. In: Huang, Z., Sun, X., Luo, J., Wang, J. (eds) Cloud Computing and Security. ICCCS 2015. Lecture Notes in Computer Science(), vol 9483. Springer, Cham. https://doi.org/10.1007/978-3-319-27051-7_37
Download citation
DOI: https://doi.org/10.1007/978-3-319-27051-7_37
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-27050-0
Online ISBN: 978-3-319-27051-7
eBook Packages: Computer ScienceComputer Science (R0)