skip to main content
article

ELF-Miner: using structural knowledge and data mining methods to detect new (Linux) malicious executables

Published: 01 March 2012 Publication History

Abstract

Linux malware can pose a significant threat—its (Linux) penetration is exponentially increasing—because little is known or understood about Linux OS vulnerabilities. We believe that now is the right time to devise non-signature based zero-day (previously unknown) malware detection strategies before Linux intruders take us by surprise. Therefore, in this paper, we first do a forensic analysis of Linux executable and linkable format (ELF) files. Our forensic analysis provides insight into different features that have the potential to discriminate malicious executables from benign ones. As a result, we can select a features’ set of 383 features that are extracted from an ELF headers. We quantify the classification potential of features using information gain and then remove redundant features by employing preprocessing filters. Finally, we do an extensive evaluation among classical rule-based machine learning classifiers—RIPPER, PART, C4.5 Rules, and decision tree J48—and bio-inspired classifiers—cAnt Miner, UCS, XCS, and GAssist—to select the best classifier for our system. We have evaluated our approach on an available collection of 709 Linux malware samples from vx heavens and offensive computing. Our experiments show that ELF-Miner provides more than 99% detection accuracy with less than 0.1% false alarm rate.

Cited By

View all
  • (2022)A Survey of Binary Code Fingerprinting Approaches: Taxonomy, Methodologies, and FeaturesACM Computing Surveys10.1145/348686055:1(1-41)Online publication date: 17-Jan-2022
  • (2015)DLLMinerSecurity and Communication Networks10.1002/sec.12558:18(3311-3322)Online publication date: 1-Dec-2015
  • (2012)Using low-level dynamic attributes for malware detection based on data mining methodsProceedings of the 6th international conference on Mathematical Methods, Models and Architectures for Computer Network Security: computer network security10.1007/978-3-642-33704-8_22(254-269)Online publication date: 17-Oct-2012

Index Terms

  1. ELF-Miner: using structural knowledge and data mining methods to detect new (Linux) malicious executables
    Index terms have been assigned to the content through auto-classification.

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image Knowledge and Information Systems
    Knowledge and Information Systems  Volume 30, Issue 3
    March 2012
    50 pages

    Publisher

    Springer-Verlag

    Berlin, Heidelberg

    Publication History

    Published: 01 March 2012

    Author Tags

    1. Data mining
    2. Evolutionary computing
    3. Information security
    4. Linux malware
    5. Machine learning
    6. Malicious executables
    7. Malware forensics
    8. Structural information

    Qualifiers

    • Article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 23 Sep 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2022)A Survey of Binary Code Fingerprinting Approaches: Taxonomy, Methodologies, and FeaturesACM Computing Surveys10.1145/348686055:1(1-41)Online publication date: 17-Jan-2022
    • (2015)DLLMinerSecurity and Communication Networks10.1002/sec.12558:18(3311-3322)Online publication date: 1-Dec-2015
    • (2012)Using low-level dynamic attributes for malware detection based on data mining methodsProceedings of the 6th international conference on Mathematical Methods, Models and Architectures for Computer Network Security: computer network security10.1007/978-3-642-33704-8_22(254-269)Online publication date: 17-Oct-2012

    View Options

    View options

    Get Access

    Login options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media