Identifying Encrypted Malware Traffic with Contextual Flow Data

被引:142
|
作者
Anderson, Blake [1 ]
McGrew, David [1 ]
机构
[1] Cisco, San Jose, CA 95134 USA
来源
AISEC'16: PROCEEDINGS OF THE 2016 ACM WORKSHOP ON ARTIFICIAL INTELLIGENCE AND SECURITY | 2016年
关键词
Encryption; Malware; Machine Learning; Transport Layer Security; Network Monitoring;
D O I
10.1145/2996758.2996768
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Identifying threats contained within encrypted network traffic poses a unique set of challenges. It is important to monitor this traffic for threats and malware, but do so in a way that maintains the integrity of the encryption. Because pattern matching cannot operate on encrypted data, previous approaches have leveraged observable metadata gathered from the flow, e.g., the flow's packet lengths and inter-arrival times. In this work, we extend the current state-of-the-art by considering a data omnia approach. To this end, we develop supervised machine learning models that take advantage of a unique and diverse set of network flow data features. These data features include TLS handshake meta data, DNS contextual flows linked to the encrypted flow, and the HTTP headers of HTTP contextual flows from the same source IP address within a 5 minute window. We begin by exhibiting the differences between malicious and benign traffic's use of TLS, DNS, and HTTP on millions of unique flows. This study is used to design the feature sets that have the most discriminatory power. We then show that incorporating this contextual information into a supervised learning system significantly increases performance at a 0.00% false discovery rate for the problem of classifying encrypted, malicious flows. We further validate our false positive rate on an independent, real-world dataset.
引用
收藏
页码:35 / 46
页数:12
相关论文
共 50 条
  • [1] A novel approach based on adaptive online analysis of encrypted traffic for identifying Malware in IIoT
    Niu, Zequn
    Xue, Jingfeng
    Qu, Dacheng
    Wang, Yong
    Zheng, Jun
    Zhu, Hongfei
    INFORMATION SCIENCES, 2022, 601 : 162 - 174
  • [2] MalDetect: A Structure of Encrypted Malware Traffic Detection
    Liu, Jiyuan
    Zeng, Yingzhi
    Shi, Jiangyong
    Yang, Yuexiang
    Wang, Rui
    He, Liangzhong
    CMC-COMPUTERS MATERIALS & CONTINUA, 2019, 60 (02): : 721 - 739
  • [3] Poster: Feasibility of Malware Traffic Analysis through TLS-Encrypted Flow Visualization
    Kim, Dongeon
    Han, Jihun
    Lee, Jinwoo
    Roh, Heejun
    Lee, Wonjun
    2020 IEEE 28TH INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS (IEEE ICNP 2020), 2020,
  • [4] Using Features of Encrypted Network Traffic to Detect Malware
    Afzal, Zeeshan
    Brunstrom, Anna
    Lindskog, Stefan
    SECURE IT SYSTEMS, NORDSEC 2020, 2021, 12556 : 37 - 53
  • [5] Malware Detection by Analysing Encrypted Network Traffic with Neural Networks
    Prasse, Paul
    Machlica, Lukas
    Pevny, Tomas
    Havelka, Jiri
    Scheffer, Tobias
    MACHINE LEARNING AND KNOWLEDGE DISCOVERY IN DATABASES, ECML PKDD 2017, PT II, 2017, 10535 : 73 - 88
  • [6] CoTNeT: Contextual transformer network for encrypted traffic classification
    Huang, Hong
    Lu, Ye
    Zhou, Shaohua
    Zhang, Xingxing
    Li, Ze
    EGYPTIAN INFORMATICS JOURNAL, 2024, 26
  • [7] Identifying Mobile Applications for Encrypted Network Traffic
    He, Gaofeng
    Xu, Bingfeng
    Zhu, Haiting
    2017 FIFTH INTERNATIONAL CONFERENCE ON ADVANCED CLOUD AND BIG DATA (CBD), 2017, : 279 - 284
  • [8] Identifying Consumer Drones via Encrypted Traffic
    Liang, David
    Dong, Yingfei
    PROCEEDINGS OF THE IUTAM SYMPOSIUM ON OPTIMAL GUIDANCE AND CONTROL FOR AUTONOMOUS SYSTEMS 2023, 2024, 40 : 65 - 83
  • [9] MEMTD: Encrypted Malware Traffic Detection Using Multimodal Deep Learning
    Zhang, Xiaotian
    Lu, Jintian
    Sun, Jiakun
    Xiao, Ruizhi
    Jin, Shuyuan
    WEB ENGINEERING (ICWE 2022), 2022, 13362 : 357 - 372
  • [10] Poster Abstract: Encrypted Malware Traffic Detection Using Incremental Learning
    Lee, Insup
    Roh, Heejun
    Lee, Wonjun
    IEEE INFOCOM 2020 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (INFOCOM WKSHPS), 2020, : 1348 - 1349