skip to main content
research-article

An online cross view difference and behavior based kernel rootkit detector

Published: 04 August 2011 Publication History

Abstract

Kernel level rootkits pose a serious threat today as they not only mask the presence of themselves but also mask the malware that comes attached with them. Rootkits achieve such stealthy behavior by manipulating the control flow of system calls by hooks and kernel objects, viz., driver and process list directly. Existing Antiviruses that rely on signature based techniques for detection of malwares are effective only against known rootkits. However, as hackers change coding style of rootkits, Antiviruses fail to detect them and rootkits and their malicious activities are hidden from the view of the administrator. Thus, all data on the compromised system becomes vulnerable to theft and all services running on it can be misused by the remote attacker without even the slightest chance of being discovered. Other rootkit detection techniques such as integrity checking, alternate trusted medium, and memory dumping require frequent offline analysis and fail to unload or block the rootkit.
This paper addresses, these challenges and proposes an online cross view difference and behavior based kernel rootkit detector to overcome them. Our proposed solution Kernel Rootkit Trojan Detector (KeRTD) is a host-based and cross view difference-based solution that enables online analysis and aids detection of rootkit immediately. A simple view difference of snapshot of Task manager in user mode and KeRTD Process and Driver List helps the detection of hidden rootkits and other hidden malwares. All rootkits follow a generic pattern of infection such as installing kernel hooks and modification of kernel objects, etc. This very generic behavior of rootkit is exploited in KeRTD to detect and restore the kernel hooks, thus blocking them from further infection. Every file and memory accesses are verified against Access Control List to avoid subversion of KeRTD and operating system kernel. This proposal has been implemented on windows operating system and tested for various methods of attack by kernel rootkits. The results confirm the detection of the kernel rootkits.

References

[1]
Baligaa, A., Iftodea, L., and Chenb, X. 2008. Automated containment of rootkits attacks. Computers and Security, 27 (7-8), 323--334. DOI= http://dx.doi.org/10.1016/j.cose.2008.06.003.
[2]
Wang, Y. M., Beck, D., Vo, B., Roussev, R., and Verbowski, C. 2005. Detecting Stealth Software with Strider GhostBuster. In Proceedings of the International Conference on Dependable Systems and Networks 05 (Redmond, USA, 2005), Microsoft Research, 368--377. DOI= http://dx.doi.org/10.1109/DSN.2005.39.
[3]
Grizzard, J. B., Levine, J. G., and Owen, H. L. 2009. Reestablishing Trust in Compromised Systems: Recovering from Rootkits That Trojan the System Call Table. In Proceedings of the 4th ACM European conference on Computer systems, 369--384.
[4]
Riley, R., Jiang, X., and Xu, D. 2009. Multi-Aspect Profiling of Kernel Rootkit Behavior. In Proceedings of the 4th ACM SIGOPS EuroSys Conference (New York, USA, April 01-03, 2009), 47--60.
[5]
Jiang, Y. X., Wang, X., and Xu, D. 2010. Stealthy Malware Detection Through VMM-Based "Out-of-the-Box" Semantic View Reconstruction. Transactions of Information and Security Systems (TISSEC), 13(2), 128--138. DOI=http://dx.doi.org/10.1145/1698750.1698752
[6]
Hamlen, K. W., Mohan, V., Mahsud, M. M., Khan, L., and Thuraisingham, B. 2009. Exploiting an Antivirus Interface. Computer Standards and Interface. Computer Standards and Interfaces, 31(6), 1182--1189.
[7]
Oney, W. 2003. Programming The Windows Driver Model, 2nd Edition. Microsoft Press.
[8]
RicVieler. 2007. Professional Rootkits, WroxPress.
[9]
Russinovich, M. E., Solomon, D. A. Microsoft Windows Internals, Fourth Edition Microsoft Windows Server 2003, Windows XP, and Windows 2000, Microsoft Press, December 08, 2004.
[10]
Windows Sysinternals: Documentation, downloads and additional resources. Retrieved August 3, 2010, from Microsoft Corporation: http://technet.microsoft.com/en-us/sysinternals/
[11]
Rootkit -- Wikipedia, the free encyclopedia. Retrieved July 10, 2010, from Wikimedia Foundation: http://en.wikipedia.org/wiki/Rootkit
[12]
OSR Online -- The Home page for Windows Driver Developers. Retrieved August 1, 2010: http://www.osronline.com/
[13]
Danseglio, M., and Bailey, T. Rootkits: The Obscure Hacker Attack. Retrieved August 5, 2010, from Microsoft Corporation: http://technet.microsoft.com/en-us/library/cc512642.aspx
[14]
Kim, G. H., and Spafford, E. H. 1994. The design and implementation of tripwire: a file system integrity checker. In Proceedings of 2nd ACM Conference on Computer and Communications Security, (New York, USA, November, 1994) 18--29.
[15]
Tereshkin, A., and Wojtczuk, R. Introducing Ring -3 Rootkits, 2009. Retrieved August 5, 2010, from Invisible Things Lab: http://invisiblethingslab.com/resources/bh09usa/Ring%20-3%20Rootkits.pdf
[16]
Ries, C.Inside windows rootkits. Retrieved September 7, 2010: http://www.madchat.fr/vxdevl/library/Inside%20Windows%20Rootkits.pdf
[17]
Windows Rootkit Overview. Retrieved September 7, 2010, from Symantec Corporation: http://www.symantec.com/avcenter/reference/windows.rootkit.overview.pdf
[18]
GMER -- Rootkit Detector and Remover. Retrieved November 11, 2010: http://www.gmer.net/
[19]
Rootkit.com. Retrieved August 2, 2010: http://www.rootkit.com
[20]
Hex-Rays Home Page. Retrieved March 9, 2011, from Hex-Rays SA: http://www.hex-rays.com/idapro/idadownfreeware.htm/
[21]
Mahapatra, C. Kernel Rootkit Trojan Detection. M. Tech. Project reports, Phase I and Phase II, December 2010 and May 2011, Dept. of CSE, National Institute of Technology, Tiruchirappalli, Tamil Nadu, India.

Cited By

View all
  • (2023)Rootkit Detection Mechanisms for Linux Systems2023 9th International Conference on Computer and Communications (ICCC)10.1109/ICCC59590.2023.10507534(2149-2154)Online publication date: 8-Dec-2023
  • (2021)Comprehensive Review of Malware Detection Techniques2021 International Conference on Innovative Computing (ICIC)10.1109/ICIC53490.2021.9693072(1-6)Online publication date: 9-Nov-2021
  • (2019)Nonvolatile kernel rootkit detection using cross‐view clean boot in cloud computingConcurrency and Computation: Practice and Experience10.1002/cpe.523933:3Online publication date: 20-Mar-2019
  • Show More Cited By

Index Terms

  1. An online cross view difference and behavior based kernel rootkit detector

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM SIGSOFT Software Engineering Notes
    ACM SIGSOFT Software Engineering Notes  Volume 36, Issue 4
    July 2011
    142 pages
    ISSN:0163-5948
    DOI:10.1145/1988997
    Issue’s Table of Contents

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 04 August 2011
    Published in SIGSOFT Volume 36, Issue 4

    Check for updates

    Author Tags

    1. SSDT hooks
    2. alternate data streams
    3. direct kernel object manipulation
    4. kernel level rootkits
    5. remote controller
    6. transport device interface

    Qualifiers

    • Research-article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)14
    • Downloads (Last 6 weeks)3
    Reflects downloads up to 07 Mar 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2023)Rootkit Detection Mechanisms for Linux Systems2023 9th International Conference on Computer and Communications (ICCC)10.1109/ICCC59590.2023.10507534(2149-2154)Online publication date: 8-Dec-2023
    • (2021)Comprehensive Review of Malware Detection Techniques2021 International Conference on Innovative Computing (ICIC)10.1109/ICIC53490.2021.9693072(1-6)Online publication date: 9-Nov-2021
    • (2019)Nonvolatile kernel rootkit detection using cross‐view clean boot in cloud computingConcurrency and Computation: Practice and Experience10.1002/cpe.523933:3Online publication date: 20-Mar-2019
    • (2017)HyBIS: Advanced Introspection for Effective Windows Guest ProtectionICT Systems Security and Privacy Protection10.1007/978-3-319-58469-0_13(189-204)Online publication date: 4-May-2017

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media