Exploiting \texttt{ftrace}'s \texttt{function\_graph} Tracer Features for Machine Learning: A Case Study on Encryption Detection
By: Kenan Begovic, Abdulaziz Al-Ali, Qutaibah Malluhi
Potential Business Impact:
Helps computers learn what programs are running.
This paper proposes using the Linux kernel ftrace framework, particularly the function graph tracer, to generate informative system level data for machine learning (ML) applications. Experiments on a real world encryption detection task demonstrate the efficacy of the proposed features across several learning algorithms. The learner faces the problem of detecting encryption activities across a large dataset of files, using function call traces and graph based features. Empirical results highlight an outstanding accuracy of 99.28 on the task at hand, underscoring the efficacy of features derived from the function graph tracer. The results were further validated in an additional experiment targeting a multilabel classification problem, in which running programs were identified from trace data. This work provides comprehensive methodologies for preprocessing raw trace data and extracting graph based features, offering significant advancements in applying ML to system behavior analysis, program identification, and anomaly detection. By bridging the gap between system tracing and ML, this paper paves the way for innovative solutions in performance monitoring and security analytics.
Similar Papers
Demystifying Feature Engineering in Malware Analysis of API Call Sequences
Cryptography and Security
Finds computer viruses by watching how programs run.
Hybrid Cryptographic Monitoring System for Side-Channel Attack Detection on PYNQ SoCs
Cryptography and Security
Protects secret codes from being broken by hackers.
A Graph Machine Learning Approach for Detecting Topological Patterns in Transactional Graphs
Machine Learning (CS)
Finds hidden money crimes using connected data.