RT - Journal Article T1 - Domain Ontology to Distinguish Different Types of Rootkits JF - ITRC YR - 2017 JO - ITRC VO - 9 IS - 3 UR - http://ijict.itrc.ac.ir/article-1-32-en.html SP - 17 EP - 24 K1 - Ontology K1 - Rootkit K1 - Malware K1 - Security AB - Rootkit is an auxiliary tool for sniffing, stealing and hiding, so it has become the key component in almost all successful attacks. Analysis of rootkits will provide system administrators and security software managers the ability to detect and prevent a computer being compromised. Ontology will provide detailed conceptualization to represent the rootkit concepts and its relationships to other security concepts in cyber-attack domain. In this paper we presented an ontology for rootkits which contains many concepts relating to security, cyber-attacks and operating systems. We divided rootkits according to four attributes, and expanded the ontology for rootkits accordingly. This ontology can be used to distinguish different types of rootkits. LA eng UL http://ijict.itrc.ac.ir/article-1-32-en.html M3 ER -