About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
Digital Forensics and Cyber Crime. 13th EAI International Conference, ICDF2C 2022, Boston, MA, November 16-18, 2022, Proceedings

Research Article

Volatility Custom Profiling for Automated Hybrid ELF Malware Detection

Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1007/978-3-031-36574-4_16,
        author={Rahul Varshney and Nitesh Kumar and Anand Handa and Sandeep Kumar Shukla},
        title={Volatility Custom Profiling for Automated Hybrid ELF Malware Detection},
        proceedings={Digital Forensics and Cyber Crime. 13th EAI International Conference, ICDF2C 2022, Boston, MA, November 16-18, 2022, Proceedings},
        proceedings_a={ICDF2C},
        year={2023},
        month={7},
        keywords={ELF malware Malware detection Memory forensics Machine learning Volatility Limon sandbox},
        doi={10.1007/978-3-031-36574-4_16}
    }
    
  • Rahul Varshney
    Nitesh Kumar
    Anand Handa
    Sandeep Kumar Shukla
    Year: 2023
    Volatility Custom Profiling for Automated Hybrid ELF Malware Detection
    ICDF2C
    Springer
    DOI: 10.1007/978-3-031-36574-4_16
Rahul Varshney1, Nitesh Kumar1, Anand Handa1,*, Sandeep Kumar Shukla1
  • 1: C3i Center, Department of CSE, Indian Institute of Technology
*Contact email: ahanda@cse.iitk.ac.in

Abstract

The increasing prevalence of Linux malware poses a severe threat to private data and expensive computer resources. Hence, there is a dire need to detect Linux malware automatically to comprehend its capabilities and behavior. In our work, we attempt to analyze the ELF binary files before, during, and after execution (or postmortem inspection) using open-source tools. We analyze the ELF binaries in a controlled sandboxed space and monitor the activities of these binaries and their child processes to assess their capabilities and behaviors. We set upINetSim, and simulate the fake internet services to increase the chances of malware behaving as intended. We also generate a customOS profileof Ubuntu 16.04. The Volatility tool employs this profile to analyze the memory dump and extract the artifacts. We modify the Limon sandbox to use only specific volatility plugins, which reduces the time for report generation. We extract features from these behavior reports and reports from memory forensics and combine them with features extracted using static analysis to build a hybrid model for ELF malware detection. Our trained hybrid model offers a good accuracy of 99.2% on a recent dataset of benign and malware samples and with a minimal false-positive rate of 0.9%. To the best of our knowledge, no one in the literature has performed the memory analysis of ELF malware using the Volatility profile customization for efficient ELF malware detection.

Keywords
ELF malware Malware detection Memory forensics Machine learning Volatility Limon sandbox
Published
2023-07-16
Appears in
SpringerLink
http://dx.doi.org/10.1007/978-3-031-36574-4_16
Copyright © 2022–2025 ICST
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL