Skip to main content

Advances, Systems and Applications

Table 3 True positive rootkit detection time

From: Volatile Kernel Rootkit hidden process detection in cloud computing

Rootkit Name

3 TB Volume (Detection Time)(198)

5 TB Volume (Detection Time)(208)

7 TB Volume (Detection Time)(214)

 

Windows mSec

Ubuntu m Sec

Windows mSec

Ubuntu mSec

Windows mSec

Ubuntu Sec

Win32:Agent-WXK

205

200

212

210

218

215

Form.fam

206

198

213

209

216

214

Virus.Boot.ASBV

204

202

213

211

218

216

W32/Trojan2.NFKE

205

198

214

208

219

215

NYB-F

205

202

213

210

219

216

HackTool/Perl.CleanLog

207

205

214

211

217

215

Virus.BAT.Qwerty.b

204

202

213

211

220

217

Downloader-AWM.gen

203

200

214

210

218

220

PWS-Gamania.gen.a

205

203

214

211

216

219

W32Fujacks

204

201

214

212

217

219

BackDoor-DIQ

206

198

215

208

218

214

Vanquish.exe

202

199

212

209

216

215

Vanquish.dll

205

200

212

208

217

215

Virus.BAT.Qwerty.a

206

202

214

210

216

216

Virus.Boot.Catman

205

203

213

208

217

215

Virus.DOS.Trivial.140

210

204

212

209

216

214

Virus.Unix.Sillysh.b

205

201

213

210

217

215

Trojan.Starter.1695

206

200

214

212

216

216

W-boot.A

205

199

215

213

220

214