Data Exfiltration Detection on Network Metadata with Autoencoders

被引:2
|
作者
Willems, Daan [1 ]
Kohls, Katharina [2 ]
van der Kamp, Bob [1 ]
Vranken, Harald [2 ,3 ]
机构
[1] Minist Justice & Secur, Natl Cyber Secur Ctr NCSC, NL-2511 DP The Hague, Netherlands
[2] Radboud Univ Nijmegen, Inst Comp & Informat Sci, Fac Sci, NL-6525 AJ Nijmegen, Netherlands
[3] Open Univ Netherlands, Fac Sci, Dept Comp Sci, NL-6419 AT Heerlen, Netherlands
关键词
network intrusion detection; data exfiltration; autoencoder; anomaly detection; ANOMALY DETECTION;
D O I
10.3390/electronics12122584
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We designed a Network Exfiltration Detection System (NEDS) to detect data exfiltration as occurring in ransomware attacks. The NEDS operates on aggregated metadata, which is more privacy-friendly and allows analysis of large volumes of high-speed network traffic. The NEDS aggregates metadata from multiple, sequential sessions between pairs of hosts in a network, which captures exfiltration by both stateful and stateless protocols. The aggregated metadata include averages per session of both packet count, request entropy, duration, and payload size, as well as the average time between sequential sessions and the amount of aggregated sessions. The NEDS applies a number of autoencoder models with unsupervised learning to detect anomalies, where each autoencoder model targets different protocols. We trained the autoencoder models with real-life data collected at network sensors in the National Detection Network as operated by the National Cyber Security Centre in the Netherlands, and configured the detection threshold by varying the false positive rate. We evaluated the detection performance by injecting exfiltration over different channels, including DNS tunnels and uploads to FTP servers, web servers, and cloud storage. Our experimental results show that aggregation significantly increases detection performance of exfiltration that happens over longer time, most notably, DNS tunnels. Our NEDS can be applied to detect exfiltration either in near-real-time data analysis with limited false positive rates, or in captured data to aid in post-incident analysis.
引用
收藏
页数:20
相关论文
共 50 条
  • [1] An Integrated Network Behavior and Policy Based Data Exfiltration Detection Framework
    Rajamenakshi, R.
    Padmavathi, G.
    PROCEEDINGS OF THE FIFTH INTERNATIONAL CONFERENCE ON FUZZY AND NEURO COMPUTING (FANCCO - 2015), 2015, 415 : 337 - 351
  • [2] Data Exfiltration: Methods and Detection Countermeasures
    King, James
    Bendiab, Gueltoum
    Savage, Nick
    Shiaeles, Stavros
    PROCEEDINGS OF THE 2021 IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND RESILIENCE (IEEE CSR), 2021, : 442 - 447
  • [3] Improving Data Generalization With Variational Autoencoders for Network Traffic Anomaly Detection
    Monshizadeh, Mehrnoosh
    Khatri, Vikramajeet
    Gamdou, Marah
    Kantola, Raimo
    Yan, Zheng
    IEEE ACCESS, 2021, 9 : 56893 - 56907
  • [4] Analysis of Autoencoders for Network Intrusion Detection
    Song, Youngrok
    Hyun, Sangwon
    Cheong, Yun-Gyung
    SENSORS, 2021, 21 (13)
  • [5] Analysis and Detection of Malicious Data Exfiltration in Web Traffic
    Al-Bataineh, Areej
    White, Gregory
    PROCEEDINGS OF THE 2012 7TH INTERNATIONAL CONFERENCE ON MALICIOUS AND UNWANTED SOFTWARE, 2012, : 26 - 31
  • [6] APPLYING NETWORK ADDRESS ENCRYPTION TO ANONYMITY AND PREVENTING DATA EXFILTRATION
    Trostle, Jonathan
    2008 IEEE MILITARY COMMUNICATIONS CONFERENCE: MILCOM 2008, VOLS 1-7, 2008, : 1206 - 1212
  • [7] Alcatraz: Data Exfiltration-Resilient Corporate Network Architecture
    Asoni, Daniele E.
    Sasaki, Takayuki
    Perrig, Adrian
    2018 4TH IEEE INTERNATIONAL CONFERENCE ON COLLABORATION AND INTERNET COMPUTING (CIC 2018), 2018, : 176 - 187
  • [8] DROPWAT: An Invisible Network Flow Watermark for Data Exfiltration Traceback
    Iacovazzi, Alfonso
    Sarda, Sanat
    Frassinelli, Daniel
    Elovici, Yuval
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (05) : 1139 - 1154
  • [9] Anomaly Detection using Network Metadata
    Mutmbak, Khaled
    Alotaibi, Sultan
    Alharbi, Khalid
    Albalawi, Umar
    Younes, Osama
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2022, 13 (05) : 809 - 814
  • [10] Improving DNS Data Exfiltration Detection Through Temporal Analysis
    Spathoulas, Georgios
    Anagnostopoulos, Marios
    Papageorgiou, Konstantinos
    Kavallieratos, Georgios
    Theodoridis, Georgios
    UBIQUITOUS SECURITY, UBISEC 2023, 2024, 2034 : 133 - 146