NUST Institutional Repository

Detection of rootkits using memory analysis

Show simple item record

dc.contributor.author Noor, Basirah
dc.date.accessioned 2023-06-20T09:15:59Z
dc.date.available 2023-06-20T09:15:59Z
dc.date.issued 2023
dc.identifier.other 318515
dc.identifier.uri http://10.250.8.41:8080/xmlui/handle/123456789/34098
dc.description Supevisor: Dr. Sana Qadir en_US
dc.description.abstract Rootkits are malicious software designed to hide their presence and activities on compromised systems. Traditional detection methods often struggle to identify rootkits due to their ability to mimic normal files and evade detection. However, volatile memory analysis has emerged as a powerful technique for monitoring system activities. In this thesis, we propose the use of memory analysis combined with machine learning and deep learning to develop an effective rootkit detection model. By analyzing the contents of the system’s volatile memory, our model aims to identify suspicious patterns and behaviors that indicate the presence of rootkits. We employ machine learning and deep learning approach to train the model on a comprehensive dataset of known rootkit samples, enabling it to learn and recognize the distinct characteristics associated with these stealthy malwares. Through extensive experiments and evaluations, we assess the performance and accuracy of our model in detecting various types of rootkits. The results demonstrate the effectiveness of memory analysis combined with machine learning/deep learning in rootkit detection, offering a promising solution to combat the ever-evolving threat of these elusive malware. This research contributes to the development of advanced defense mechanisms and enhances the security posture of systems against rootkit attacks. en_US
dc.language.iso en en_US
dc.publisher School of Electrical Engineering & Computer Science (SEECS) en_US
dc.title Detection of rootkits using memory analysis en_US
dc.type Thesis en_US


Files in this item

This item appears in the following Collection(s)

  • MS [146]

Show simple item record

Search DSpace


Advanced Search

Browse

My Account