Identifying Rootkit Infections Using Data Mining

Loading...
Thumbnail Image
File version
Author(s)
Wu, Xin-Wen
Lobo, Desmond
Watters, Paul
Griffith University Author(s)
Primary Supervisor
Other Supervisors
Editor(s)

Jeomgoo Kim and SeongJin Ahn

Date
2010
Size

136374 bytes

File type(s)

application/pdf

Location

Seoul, Korea

License
Abstract

Rootkits refer to software that is used to hide the presence and activity of malware and permit an attacker to take control of a computer system. In our previous work, we focused strictly on identifying rootkits that use inline function hooking techniques to remain hidden. In this paper, we extend our previous work by including rootkits that use other types of hooking techniques, such as those that hook the IATs (Import Address Tables) and SSDTs (System Service Descriptor Tables). Unlike other malware identification techniques, our approach involved conducting dynamic analyses of various rootkits and then determining the family of each rootkit based on the hooks that had been created on the system. We demonstrated the effectiveness of this approach by first using the CLOPE (Clustering with sLOPE) algorithm to cluster a sample of rootkits into several families; next, the ID3 (Iterative Dichotomiser 3) algorithm was utilized to generate a decision tree for identifying the rootkit that had infected a machine.

Journal Title
Conference Title

Proceedings of The 2010 International Conference on Information Science and Applications (ICISA)

Book Title
Edition
Volume
Issue
Thesis Type
Degree Program
School
Publisher link
Patent number
Funder(s)
Grant identifier(s)
Rights Statement
Rights Statement

© 2010 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.

Item Access Status
Note
Access the data
Related item(s)
Subject

Information and Computing Sciences not elsewhere classified

Persistent link to this record
Citation