Skip to main content

Research on Rootkit Detection Model Based on Intelligent Optimization Algorithm in the Virtualization Environment

  • Conference paper
  • First Online:
Cloud Computing and Security (ICCCS 2015)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 9483))

Included in the following conference series:

  • 1728 Accesses

Abstract

In order to solve the problems that the high misjudgment ratio of Rootkit detection and undetectable unknown Rootkit in the virtualization guest operating system, a Rootkit detecting model (QNDRM) based on intelligent optimization algorithm was proposed. The detecting model combines neural network with QPSO, which can take advantage of them. In the actual detection, QNDRM firstly captures the previously selected out Rootkit’s typical characteristic behaviors. And then, the trained system detects the presence of Rootkit. The experimental results show that QNDRM can effectively reduce the misjudgment ratio and detect both known and unknown Rootkit.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Vivek, K.: Guide to Cloud Computing for Business and Technology Managers: From Distributed Computing to Cloudware Applications. CRC Press, Boca Raton (2014)

    Google Scholar 

  2. Hoglund, G., Butler, J.: Rootkits: Subverting the Windows Kernel. Addison-Wesley Professional, Reading (2006)

    Google Scholar 

  3. Lu, T.: Research on Malcode Detection Technology Based on Artificial Immune System. Beijing University of Posts and Telecommunications (2013)

    Google Scholar 

  4. Zhang F.: Research on Artificial Immune Algorithms on Malware Detection. South China University of Technology (2012)

    Google Scholar 

  5. Jianfeng, Pan: Design and Implemetation of Host-Based Malcode Detection System. University of Science and Technology of China, Anhui (2009)

    Google Scholar 

  6. Shirazi, H.M.: An intelligent intrusion detection system using genetic algorithms and features selection. Majlesi J. Electr. Eng. 4(1), 33–43 (2010)

    Google Scholar 

  7. Abadeh, M.S., Habibi, J.A.: Hybridization of evolutionary fuzzy systems and ant colony optimization for intrusion detection. ISC Int. J. Inf. Secur. 2(1), 33–46 (2015)

    Google Scholar 

  8. Dastanpour, A., Ibrahim, S., Mashinchi, R.: Using genetic algorithm to supporting artificial neural network for intrusion detection system. In: The International Conference on Computer Security and Digital Investigation (ComSec2014). The Society of Digital Information and Wireless Communication, pp. 1–13 (2014)

    Google Scholar 

  9. Yuan, X., Li, H., Liu, S.: Neural Network and Genetic Algorithm Apply in Water Science. China Water & Power Press, Beijing (2002)

    Google Scholar 

  10. Zhu H.: Intrusion Detection System Research Based on Neural Network. Shandong University (2008)

    Google Scholar 

  11. Wan, T., Ma, J., Zeng, G.: Analysis of sample database for intelligence intrusion detection evaluation. South-Central Univ. Nationalities 2(29), 84–87 (2010)

    Google Scholar 

  12. Debar, H., Becker, M., Siboni, D.: A neural network component for an intrusion detection system. In: Proceedings of the 1992 IEEE Computer Society Symposium on Research in Security and Privacy, pp. 240–250. IEEE (1992)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Lei Sun .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

Âİ 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Sun, L., Zhao, Z., Wang, F., Jin, L. (2015). Research on Rootkit Detection Model Based on Intelligent Optimization Algorithm in the Virtualization Environment. In: Huang, Z., Sun, X., Luo, J., Wang, J. (eds) Cloud Computing and Security. ICCCS 2015. Lecture Notes in Computer Science(), vol 9483. Springer, Cham. https://doi.org/10.1007/978-3-319-27051-7_37

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-27051-7_37

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-27050-0

  • Online ISBN: 978-3-319-27051-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics