Towards the Unraveling of Zombie Effect in the Linux Kernel
https://doi.org/10.56225/ijgoia.v3i2.302
Keywords:
Linux kernel, Process table, Zombie state, Kernel functions, Zombie processes, Memory management, Parent process, Child processAbstract
A zombie process is a type of process that has completed its execution but still has an entry in the process table. Zombie processes are typically created when a child process terminates, but its parent process fails to collect its termination status. Now that the fork () has created a new process, it duplicates the calling process. The new process is referred to as the child process. The calling process is referred to as the parent process. The child and parent processes are to run in separate memory spaces. Both memory spaces have the same content at the time of fork (). Whenever in Linux, a process is an instance of executing a program or command. While these processes exist, they will be in one of the five possible states, such as Running or Runnable (R), Uninterruptible Sleep (D), or Interruptable Sleep (S). Another process (the parent process) creates a child computing process. This technique pertains to multitasking operating systems and is sometimes called a subprocess or, traditionally, a subtask. Hence, there are five Linux process states. Such as running & runnable, interruptable sleep, uninterruptable sleep, stopped, and zombie. Each of these processes exists for a very well-defined reason. After all, a zombie process in Linux is a terminated child process that remains in the system's process table while waiting for its parent process to collect its exit status. A zombie process is a type of process that has completed its execution but still has an entry in the process table. As a result, if too many zombie processes are generated, the process table will be full. That is, the system will not be able to generate any new process, then the system will come to a standstill.
Downloads
References
Abdulrahman, A. A. K. (2016). Multi-Level Windows Exploitation Using Linux Operating System. Asian Journal of Natural & Applied Sciences, 5(2),324-333.
Akkan, H., Lang, M., & Liebrock, L. (2013). Understanding and isolating the noise in the Linux kernel. The International journal of high-performance computing applications, 27(2), 136-146.
Feitelson, D. G. (2012). Perpetual development: a model of the Linux kernel life cycle. Journal of Systems and Software, 85(4), 859-875.
Hertel, G., Niedner, S., & Herrmann, S. (2003). Motivation of software developers in Open Source projects: an Internet-based survey of contributors to the Linux kernel. Research policy, 32(7), 1159-1177.
Hussain, A., Heidemann, J., & Papadopoulos, C. (2003, August). A framework for classifying denial of service attacks. In Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications (pp. 99-110).
Ike, U. K., Ononiwu, C., & Onumajuru, J. S. Analysis of Linux Kernel Iptables for Mitigating DDOS Attacks; A Component-Based Approach. International Journal of Computer Science and Mathematical Theory, 9(4),122-131.
Jimenez, M., Papadakis, M., & Le Traon, Y. (2016, October). Vulnerability prediction models: A case study on the linux kernel. In 2016 IEEE 16th International Working Conference on Source Code Analysis and Manipulation (SCAM) (pp. 1-10). IEEE.
Khan, A. W., Zaib, S., Khan, F., Tarimer, I., Seo, J. T., & Shin, J. (2022). Analyzing and evaluating critical cyber security challenges faced by vendor organizations in software development: SLR based approach. IEEE access, 10, 65044-65054.
Merlo, E., Dagenais, M., Bachand, P., Sormani, J. S., Gradara, S., & Antoniol, G. (2002, August). Investigating large software system evolution: the linux kernel. In Proceedings 26th Annual International Computer Software and Applications (pp. 421-426). IEEE.
Nagpal, D., & Sharma, D. (2016). Overview of Threats and Attacks in Cloud Infrastructure. International Journal of Research in IT, Management and Engineering, 6(6), 16-23.
Raheja, S., Munjal, G., and Shagun, S. (2016). Analysis of Linux Kernel Vulnerabilities. Indian Journal of Science and Technology, 9(48), 39-48.
Ramirez, R., & Choucri, N. (2016). Improving interdisciplinary communication with standardized cyber security terminology: a literature review. IEEE Access, 4, 2216-2243.
Reghenzani, F., Massari, G., & Fornaciari, W. (2019). The real-time linux kernel: A survey on preempt_rt. ACM Computing Surveys (CSUR), 52(1), 1-36.
Saravanan, A., Bama, S. S., Kadry, S., & Ramasamy, L. K. (2019). A new framework to alleviate DDoS vulnerabilities in cloud computing. International Journal of Electrical & Computer Engineering (2088-8708), 9(5),4163-4175.
Sivabalan, S., & Radcliffe, P. J. (2017, November). Detecting IoT zombie attacks on web servers. In 2017 27th International Telecommunication Networks and Applications Conference (ITNAC) (pp. 1-3). IEEE.
Suresh, R., & Langes, C. M. Detection of Zombie Apps Using Zapdroid. International Journal of Latest Trends in Engineering and Technology,5(2),057-062.
Wang, X., & Reiter, M. K. (2003, May). Defending against denial-of-service attacks with puzzle auctions. In 2003 Symposium on Security and Privacy, 2003. (pp. 78-92). IEEE.
Yang, Y., Littler, T., Sezer, S., McLaughlin, K., & Wang, H. F. (2011, December). Impact of cyber-security issues on smart grid. In 2011 2nd IEEE PES International Conference and Exhibition on Innovative Smart Grid Technologies (pp. 1-7). IEEE.
Zhang, X., Knockel, J., & Crandall, J. R. (2015, April). Original SYN: Finding machines hidden behind firewalls. In 2015 IEEE Conference on Computer Communications (INFOCOM) (pp. 720-728). IEEE.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2024 Authors
This work is licensed under a Creative Commons Attribution 4.0 International License.
Copyright @2022. This is an open-access article distributed under the terms of the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/) which permits unrestricted to copy and redistribute the material in any medium or format, remix, transform, and build upon the material for any purpose, even commercially.
This work is licensed under a Creative Commons Attribution 4.0 International License.