Advances, Systems and Applications
From: Volatile Kernel Rootkit hidden process detection in cloud computing
Rootkit Name | 3 TB Volume (Detection Time)(198) | 5 TB Volume (Detection Time)(208) | 7 TB Volume (Detection Time)(214) | |||
---|---|---|---|---|---|---|
 | Windows mSec | Ubuntu m Sec | Windows mSec | Ubuntu mSec | Windows mSec | Ubuntu Sec |
Win32:Agent-WXK | 205 | 200 | 212 | 210 | 218 | 215 |
Form.fam | 206 | 198 | 213 | 209 | 216 | 214 |
Virus.Boot.ASBV | 204 | 202 | 213 | 211 | 218 | 216 |
W32/Trojan2.NFKE | 205 | 198 | 214 | 208 | 219 | 215 |
NYB-F | 205 | 202 | 213 | 210 | 219 | 216 |
HackTool/Perl.CleanLog | 207 | 205 | 214 | 211 | 217 | 215 |
Virus.BAT.Qwerty.b | 204 | 202 | 213 | 211 | 220 | 217 |
Downloader-AWM.gen | 203 | 200 | 214 | 210 | 218 | 220 |
PWS-Gamania.gen.a | 205 | 203 | 214 | 211 | 216 | 219 |
W32Fujacks | 204 | 201 | 214 | 212 | 217 | 219 |
BackDoor-DIQ | 206 | 198 | 215 | 208 | 218 | 214 |
Vanquish.exe | 202 | 199 | 212 | 209 | 216 | 215 |
Vanquish.dll | 205 | 200 | 212 | 208 | 217 | 215 |
Virus.BAT.Qwerty.a | 206 | 202 | 214 | 210 | 216 | 216 |
Virus.Boot.Catman | 205 | 203 | 213 | 208 | 217 | 215 |
Virus.DOS.Trivial.140 | 210 | 204 | 212 | 209 | 216 | 214 |
Virus.Unix.Sillysh.b | 205 | 201 | 213 | 210 | 217 | 215 |
Trojan.Starter.1695 | 206 | 200 | 214 | 212 | 216 | 216 |
W-boot.A | 205 | 199 | 215 | 213 | 220 | 214 |