Data Exfiltration Detection on Network Metadata with Autoencoders

被引:2
|
作者
Willems, Daan [1 ]
Kohls, Katharina [2 ]
van der Kamp, Bob [1 ]
Vranken, Harald [2 ,3 ]
机构
[1] Minist Justice & Secur, Natl Cyber Secur Ctr NCSC, NL-2511 DP The Hague, Netherlands
[2] Radboud Univ Nijmegen, Inst Comp & Informat Sci, Fac Sci, NL-6525 AJ Nijmegen, Netherlands
[3] Open Univ Netherlands, Fac Sci, Dept Comp Sci, NL-6419 AT Heerlen, Netherlands
关键词
network intrusion detection; data exfiltration; autoencoder; anomaly detection; ANOMALY DETECTION;
D O I
10.3390/electronics12122584
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We designed a Network Exfiltration Detection System (NEDS) to detect data exfiltration as occurring in ransomware attacks. The NEDS operates on aggregated metadata, which is more privacy-friendly and allows analysis of large volumes of high-speed network traffic. The NEDS aggregates metadata from multiple, sequential sessions between pairs of hosts in a network, which captures exfiltration by both stateful and stateless protocols. The aggregated metadata include averages per session of both packet count, request entropy, duration, and payload size, as well as the average time between sequential sessions and the amount of aggregated sessions. The NEDS applies a number of autoencoder models with unsupervised learning to detect anomalies, where each autoencoder model targets different protocols. We trained the autoencoder models with real-life data collected at network sensors in the National Detection Network as operated by the National Cyber Security Centre in the Netherlands, and configured the detection threshold by varying the false positive rate. We evaluated the detection performance by injecting exfiltration over different channels, including DNS tunnels and uploads to FTP servers, web servers, and cloud storage. Our experimental results show that aggregation significantly increases detection performance of exfiltration that happens over longer time, most notably, DNS tunnels. Our NEDS can be applied to detect exfiltration either in near-real-time data analysis with limited false positive rates, or in captured data to aid in post-incident analysis.
引用
收藏
页数:20
相关论文
共 50 条
  • [31] A Deep Learning pipeline for Network Anomaly Detection based on Autoencoders
    Ferraro, Antonino
    Galli, Antonio
    La Gatta, Valerio
    Postiglione, Marco
    2022 IEEE INTERNATIONAL CONFERENCE ON METROLOGY FOR EXTENDED REALITY, ARTIFICIAL INTELLIGENCE AND NEURAL ENGINEERING (METROXRAINE), 2022, : 260 - 264
  • [32] Robust Wireless Network Anomaly Detection with Collaborative Adversarial Autoencoders
    Katzef, Marc
    Cullen, Andrew C.
    Alpcan, Tansu
    Leckie, Christopher
    ICC 2023-IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, 2023, : 6343 - 6348
  • [33] Adaptive ensembles of autoencoders for unsupervised IoT network intrusion detection
    Siddiqui, Abdul Jabbar
    Boukerche, Azzedine
    COMPUTING, 2021, 103 (06) : 1209 - 1232
  • [34] Detection of Exfiltration and Tunneling over DNS
    Das, Anirban
    Shen, Min-Yi
    Shashanka, Madhu
    Wang, Jisheng
    2017 16TH IEEE INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND APPLICATIONS (ICMLA), 2017, : 737 - 742
  • [35] Using convolutional neural network autoencoders to understand unlabeled data
    Edwards, Samuel
    Lee, Michael S.
    ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING FOR MULTI-DOMAIN OPERATIONS APPLICATIONS, 2019, 11006
  • [36] GNSS metadata and data validation in the EUREF Permanent Network
    Carine Bruyninx
    Juliette Legrand
    András Fabian
    Eric Pottiaux
    GPS Solutions, 2019, 23
  • [37] Thwarting Data Exfiltration by Repackaged Applications
    Andrade, Daniel
    Kristoffersen, Thor
    Rummelhoff, Ivar
    Gerdov, Alex
    Silva, Joao Nuno
    2016 IEEE 35TH INTERNATIONAL SYMPOSIUM ON RELIABLE DISTRIBUTED SYSTEMS WORKSHOPS (SRDSW), 2016, : 43 - 48
  • [38] SALAD: A split active learning based unsupervised network data stream anomaly detection method using autoencoders
    Nixon, Christopher
    Sedky, Mohamed
    Champion, Justin
    Hassan, Mohamed
    EXPERT SYSTEMS WITH APPLICATIONS, 2024, 248
  • [39] Multi-modal data novelty detection with adversarial autoencoders
    Chen, Zeqiu
    Zhao, Kaiyi
    Sun, Ruizhi
    APPLIED SOFT COMPUTING, 2024, 165
  • [40] Anomaly detection in gravitational waves data using convolutional autoencoders
    Morawski F.
    Bejger M.
    Cuoco E.
    Petre L.
    Machine Learning: Science and Technology, 2021, 2 (04):