Visible to the public A Kernel Rootkit Detection Approach Based on Virtualization and Machine Learning

TitleA Kernel Rootkit Detection Approach Based on Virtualization and Machine Learning
Publication TypeJournal Article
Year of Publication2019
AuthorsTian, Donghai, Ma, Rui, Jia, Xiaoqi, Hu, Changzhen
JournalIEEE Access
Volume7
Pagination91657—91666
ISSN2169-3536
Keywordscomposability, feature extraction, Hardware, hardware assisted virtualization technology, invasive software, Kernel, kernel rootkit, kernel rootkit detection approach, kernel rootkit detection solution, kernel rootkit detection system, kernel space, learning (artificial intelligence), machine learning, machine learning techniques, malicious kernel module, Metrics, operating system, operating system kernels, operating systems (computers), OS, OS kernel, OS resource management, pubcrawl, Registers, resilience, Resiliency, rootkit, run-time features, security of data, system monitoring, target kernel module, TF-IDF method, user-mode rootkit detection, Virtual machine monitors, virtual machines, virtualisation, virtualization, windows kernel rootkits, Windows Operating System Security
Abstract

OS kernel is the core part of the operating system, and it plays an important role for OS resource management. A popular way to compromise OS kernel is through a kernel rootkit (i.e., malicious kernel module). Once a rootkit is loaded into the kernel space, it can carry out arbitrary malicious operations with high privilege. To defeat kernel rootkits, many approaches have been proposed in the past few years. However, existing methods suffer from some limitations: 1) most methods focus on user-mode rootkit detection; 2) some methods are limited to detect obfuscated kernel modules; and 3) some methods introduce significant performance overhead. To address these problems, we propose VKRD, a kernel rootkit detection system based on the hardware assisted virtualization technology. Compared with previous methods, VKRD can provide a transparent and an efficient execution environment for the target kernel module to reveal its run-time behavior. To select the important run-time features for training our detection models, we utilize the TF-IDF method. By combining the hardware assisted virtualization and machine learning techniques, our kernel rootkit detection solution could be potentially applied in the cloud environment. The experiments show that our system can detect windows kernel rootkits with high accuracy and moderate performance cost.

URLhttps://ieeexplore.ieee.org/document/8759003/
DOI10.1109/ACCESS.2019.2928060
Citation Keytian_kernel_2019