Towards the Unraveling of Zombie Effect in the Linux Kernel

https://doi.org/10.56225/ijgoia.v3i2.302

Authors

  • Shekh Abdullah-Al-Musa Ahmed Department of Computing and Information System, Faculty of Science and Information Technology, Daffodil International University, Daffodil Smart City, Birulia 1216, Bangladesh
  • Md. Mahmudur Rahman Department of Computing and Information System, Faculty of Science and Information Technology, Daffodil International University, Daffodil Smart City, Birulia 1216, Bangladesh
  • Shah Md. Baizid Habib Department of Computing and Information System, Faculty of Science and Information Technology, Daffodil International University, Daffodil Smart City, Birulia 1216, Bangladesh
  • Ayesha Siddika Uzra Department of Computing and Information System, Faculty of Science and Information Technology, Daffodil International University, Daffodil Smart City, Birulia 1216, Bangladesh
  • Mabia Akonda Jemi Department of Computing and Information System, Faculty of Science and Information Technology, Daffodil International University, Daffodil Smart City, Birulia 1216, Bangladesh

Keywords:

Linux kernel, Process table, Zombie state, Kernel functions, Zombie processes, Memory management, Parent process, Child process

Abstract

A zombie process is a type of process that has completed its execution but still has an entry in the process table. Zombie processes are typically created when a child process terminates, but its parent process fails to collect its termination status. Now that the fork () has created a new process, it duplicates the calling process. The new process is referred to as the child process. The calling process is referred to as the parent process. The child and parent processes are to run in separate memory spaces. Both memory spaces have the same content at the time of fork (). Whenever in Linux, a process is an instance of executing a program or command. While these processes exist, they will be in one of the five possible states, such as Running or Runnable (R), Uninterruptible Sleep (D), or Interruptable Sleep (S). Another process (the parent process) creates a child computing process. This technique pertains to multitasking operating systems and is sometimes called a subprocess or, traditionally, a subtask. Hence, there are five Linux process states. Such as running & runnable, interruptable sleep, uninterruptable sleep, stopped, and zombie. Each of these processes exists for a very well-defined reason. After all, a zombie process in Linux is a terminated child process that remains in the system's process table while waiting for its parent process to collect its exit status. A zombie process is a type of process that has completed its execution but still has an entry in the process table. As a result, if too many zombie processes are generated, the process table will be full. That is, the system will not be able to generate any new process, then the system will come to a standstill.

Downloads

Download data is not yet available.

References

Abdulrahman, A. A. K. (2016). Multi-Level Windows Exploitation Using Linux Operating System. Asian Journal of Natural & Applied Sciences, 5(2),324-333.

Akkan, H., Lang, M., & Liebrock, L. (2013). Understanding and isolating the noise in the Linux kernel. The International journal of high-performance computing applications, 27(2), 136-146.

Feitelson, D. G. (2012). Perpetual development: a model of the Linux kernel life cycle. Journal of Systems and Software, 85(4), 859-875.

Hertel, G., Niedner, S., & Herrmann, S. (2003). Motivation of software developers in Open Source projects: an Internet-based survey of contributors to the Linux kernel. Research policy, 32(7), 1159-1177.

Hussain, A., Heidemann, J., & Papadopoulos, C. (2003, August). A framework for classifying denial of service attacks. In Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications (pp. 99-110).

Ike, U. K., Ononiwu, C., & Onumajuru, J. S. Analysis of Linux Kernel Iptables for Mitigating DDOS Attacks; A Component-Based Approach. International Journal of Computer Science and Mathematical Theory, 9(4),122-131.

Jimenez, M., Papadakis, M., & Le Traon, Y. (2016, October). Vulnerability prediction models: A case study on the linux kernel. In 2016 IEEE 16th International Working Conference on Source Code Analysis and Manipulation (SCAM) (pp. 1-10). IEEE.

Khan, A. W., Zaib, S., Khan, F., Tarimer, I., Seo, J. T., & Shin, J. (2022). Analyzing and evaluating critical cyber security challenges faced by vendor organizations in software development: SLR based approach. IEEE access, 10, 65044-65054.

Merlo, E., Dagenais, M., Bachand, P., Sormani, J. S., Gradara, S., & Antoniol, G. (2002, August). Investigating large software system evolution: the linux kernel. In Proceedings 26th Annual International Computer Software and Applications (pp. 421-426). IEEE.

Nagpal, D., & Sharma, D. (2016). Overview of Threats and Attacks in Cloud Infrastructure. International Journal of Research in IT, Management and Engineering, 6(6), 16-23.

Raheja, S., Munjal, G., and Shagun, S. (2016). Analysis of Linux Kernel Vulnerabilities. Indian Journal of Science and Technology, 9(48), 39-48.

Ramirez, R., & Choucri, N. (2016). Improving interdisciplinary communication with standardized cyber security terminology: a literature review. IEEE Access, 4, 2216-2243.

Reghenzani, F., Massari, G., & Fornaciari, W. (2019). The real-time linux kernel: A survey on preempt_rt. ACM Computing Surveys (CSUR), 52(1), 1-36.

Saravanan, A., Bama, S. S., Kadry, S., & Ramasamy, L. K. (2019). A new framework to alleviate DDoS vulnerabilities in cloud computing. International Journal of Electrical & Computer Engineering (2088-8708), 9(5),4163-4175.

Sivabalan, S., & Radcliffe, P. J. (2017, November). Detecting IoT zombie attacks on web servers. In 2017 27th International Telecommunication Networks and Applications Conference (ITNAC) (pp. 1-3). IEEE.

Suresh, R., & Langes, C. M. Detection of Zombie Apps Using Zapdroid. International Journal of Latest Trends in Engineering and Technology,5(2),057-062.

Wang, X., & Reiter, M. K. (2003, May). Defending against denial-of-service attacks with puzzle auctions. In 2003 Symposium on Security and Privacy, 2003. (pp. 78-92). IEEE.

Yang, Y., Littler, T., Sezer, S., McLaughlin, K., & Wang, H. F. (2011, December). Impact of cyber-security issues on smart grid. In 2011 2nd IEEE PES International Conference and Exhibition on Innovative Smart Grid Technologies (pp. 1-7). IEEE.

Zhang, X., Knockel, J., & Crandall, J. R. (2015, April). Original SYN: Finding machines hidden behind firewalls. In 2015 IEEE Conference on Computer Communications (INFOCOM) (pp. 720-728). IEEE.

Downloads

Published

2024-06-30

How to Cite

Ahmed, S. A.-A.-M., Rahman, M. M., Habib, S. M. B., Uzra, A. S., & Jemi, M. A. (2024). Towards the Unraveling of Zombie Effect in the Linux Kernel. International Journal of Global Optimization and Its Application, 3(2), 75–80. https://doi.org/10.56225/ijgoia.v3i2.302

Issue

Section

Articles