CBSeq: A Channel-Level Behavior Sequence for Encrypted Malware Traffic Detection

被引:5
|
作者
Cui, Susu [1 ,2 ]
Dong, Cong [3 ]
Shen, Meng [4 ]
Liu, Yuling [1 ,2 ]
Jiang, Bo [1 ,2 ]
Lu, Zhigang [1 ,2 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, Beijing 100085, Peoples R China
[2] Univ Chinese Acad Sci, Sch Cyber Secur, Beijing 100049, Peoples R China
[3] Zhongguancun Lab, Beijing 100094, Peoples R China
[4] Beijing Inst Technol, Sch Cyberspace Sci & Technol, Beijing 100081, Peoples R China
基金
北京市自然科学基金;
关键词
Malware traffic; encrypted traffic; behavior sequence; unknown detection; transformer;
D O I
10.1109/TIFS.2023.3300521
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Machine learning and neural networks have become increasingly popular solutions for encrypted malware traffic detection. They mine and learn complex traffic patterns, enabling detection by fitting boundaries between malware traffic and benign traffic. Compared with signature-based methods, they have higher scalability and flexibility. However, affected by the frequent variants and updates of malware, current methods suffer from a high false positive rate and do not work well for unknown malware traffic detection. It remains a critical task to achieve effective malware traffic detection. In this paper, we introduce CBSeq to address the above problems. CBSeq is a method that constructs a stable traffic representation, behavior sequence, to characterize attacking intent and achieve malware traffic detection. We novelly propose the channels with similar behavior as the detection object and extract side-channel content to construct behavior sequence. Unlike benign activities, the behavior sequences of malware and its variant's traffic exhibit solid internal correlations. Moreover, we design the MSFormer, a powerful Transformer-based multi-sequence fusion classifier. It captures the internal similarity of behavior sequence, thereby distinguishing malware traffic from benign traffic. Our evaluations demonstrate that CBSeq performs effectively in various known malware traffic detection and exhibits superior performance in unknown malware traffic detection, outperforming state-of-the-art methods.
引用
收藏
页码:5011 / 5025
页数:15
相关论文
共 25 条
  • [21] HoleMal: A lightweight IoT malware detection framework based on efficient host-level traffic processing
    Chen, Ziqian
    Xia, Wei
    Li, Zhen
    Xiong, Gang
    Gou, Gaopeng
    Zhang, Heng
    Li, Haikuo
    Xiao, Junchao
    COMPUTERS & SECURITY, 2025, 152
  • [22] Multi-level trajectory learning for traffic behavior detection and analysis
    Hu, Hong-Yu
    Qu, Zhao-Wei
    Li, Zhi-Hui
    JOURNAL OF THE CHINESE INSTITUTE OF ENGINEERS, 2014, 37 (08) : 995 - 1006
  • [23] E-Secure: An Automated Behavior Based Malware Detection System for Corporate E-Mail Traffic
    Thebeyanthan, K.
    Achsuthan, M.
    Ashok, S.
    Vaikunthan, P.
    Senaratne, A. N.
    Abeywardena, K. Y.
    INTELLIGENT COMPUTING, VOL 2, 2019, 857 : 1056 - 1071
  • [24] MD-Miner: Behavior-Based Tracking of Network Traffic for Malware-Control Domain Detection
    Sun, Jia-Hao
    Jeng, Tzung-Han
    Chen, Chien-Chih
    Huang, Hsiu-Chuan
    Chou, Kuo-Sen
    2017 THIRD IEEE INTERNATIONAL CONFERENCE ON BIG DATA COMPUTING SERVICE AND APPLICATIONS (IEEE BIGDATASERVICE 2017), 2017, : 96 - 105
  • [25] BNS-Net: A Dual-Channel Sarcasm Detection Method Considering Behavior-Level and Sentence-Level Conflicts
    Zhou, Liming
    Xu, Xiaowei
    Wang, Xiaodong
    2024 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS, IJCNN 2024, 2024,