Identifying rootkit infections using data mining

Desmond Lobo*, Paul Watters, Xin Wen Wu

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionpeer-review

7 Citations (Scopus)

Abstract

Rootkits refer to software that is used to hide the presence and activity of malware and permit an attacker to take control of a computer system. In our previous work, we focused strictly on identifying rootkits that use inline function hooking techniques to remain hidden. In this paper, we extend our previous work by including rootkits that use other types of hooking techniques, such as those that hook the IATs (Import Address Tables) and SSDTs (System Service Descriptor Tables). Unlike other malware identification techniques, our approach involved conducting dynamic analyses of various rootkits and then determining the family of each rootkit based on the hooks that had been created on the system. We demonstrated the effectiveness of this approach by first using the CLOPE (Clustering with sLOPE) algorithm to cluster a sample of rootkits into several families; next, the ID3 (Iterative Dichotomiser 3) algorithm was utilized to generate a decision tree for identifying the rootkit that had infected a machine.

Original languageEnglish
Title of host publication2010 International Conference on Information Science and Applications, ICISA 2010
Place of PublicationPiscataway, USA
PublisherInstitute of Electrical and Electronics Engineers (IEEE)
Number of pages7
ISBN (Print)9781424459438
DOIs
Publication statusPublished - 2010
Externally publishedYes
Event2010 International Conference in Information Science and Applications, ICISA 2010 - Seoul, Korea, Republic of
Duration: 21 Apr 201023 Apr 2010

Conference

Conference2010 International Conference in Information Science and Applications, ICISA 2010
Country/TerritoryKorea, Republic of
CitySeoul
Period21/04/1023/04/10

Keywords

  • Computer security
  • Data mining
  • Rootkits

Fingerprint

Dive into the research topics of 'Identifying rootkit infections using data mining'. Together they form a unique fingerprint.

Cite this