Author Login Chief Editor Login Reviewer Login Editor Login Remote Office

Computer Engineering ›› 2026, Vol. 52 ›› Issue (3): 177-189. doi: 10.19678/j.issn.1000-3428.0069075

• Cyberspace Security • Previous Articles     Next Articles

Kernel Rootkit Detection Method Based on Multidimensional View Tracking

ZHENG Yijian, LI Yonggang*()   

  1. School of Computer Science and Technology, China University of Mining and Technology, Xuzhou 221116, Jiangsu, China
  • Received:2024-04-15 Revised:2024-09-14 Online:2026-03-15 Published:2024-11-14
  • Contact: LI Yonggang

基于多维视图追踪的内核Rootkit检测方法

郑伊健, 李勇钢*()   

  1. 中国矿业大学计算机科学与技术学院, 江苏 徐州 221116
  • 通讯作者: 李勇钢
  • 作者简介:

    郑伊健, 男, 本科生, 主研方向为信息安全

    李勇钢(通信作者), 副教授、博士后

  • 基金资助:
    中央高校基本科研业务费专项资金(2023QN1078)

Abstract:

In Linux servers, kernel Rootkit can be concealed in the operating system for a long time, causing serious kernel damage. In particular, unknown Rootkit, with random attack occurrence time and spatial distribution, pose a significant challenge to discovering the source of an attack. Because the source code is unknown, conventional methods face difficulties in analyzing its behavioral characteristics and are unable to pre-set detection points at appropriate locations. To address this threat, this study proposes a kernel Rootkit detection method based on multidimensional view tracing. By cross-comparing multiple views in both the spatial and temporal dimensions, the malicious behavior of unknown kernel Rootkit is detected and hidden data are restored. Experiments and analyses show that the proposed method is efficient in detecting kernel Rootkit, with a CPU overhead of only 0.38% in the case of a secure response cycle of 0.1 s.

Key words: kernel Rootkit, Linux server security, multidimensional view tracking, hidden detection, restore hidden data

摘要:

在Linux服务器中, 内核Rootkit因其高隐蔽性和高特权性, 可长时间潜伏在操作系统中, 对内核造成严重破坏, 尤其是未知Rootkit, 其攻击发生时间和空间分布都是随机的, 这为发现攻击源头带来严峻挑战。由于源码是未知的, 常规方法难以分析其行为特征, 也无法在合适的位置预设检测点。为了应对这一威胁, 提出一种基于多维视图追踪的内核Rootkit检测方法。通过在空间维度和时间维度上对多个视图进行交叉对比, 可检测未知内核Rootkit的恶意行为, 并还原被隐藏的数据。实验和分析显示, 该方法对内核Rootkit具有良好的检测效果, 在安全响应周期为0.1 s的情况下, 该方法引入的CPU开销仅为0.38%。

关键词: 内核Rootkit, Linux服务器安全, 多维视图追踪, 隐藏检测, 还原隐藏数据