Identifying Encrypted Malware Traffic with Contextual Flow Data

被引:142
|
作者
Anderson, Blake [1 ]
McGrew, David [1 ]
机构
[1] Cisco, San Jose, CA 95134 USA
来源
AISEC'16: PROCEEDINGS OF THE 2016 ACM WORKSHOP ON ARTIFICIAL INTELLIGENCE AND SECURITY | 2016年
关键词
Encryption; Malware; Machine Learning; Transport Layer Security; Network Monitoring;
D O I
10.1145/2996758.2996768
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Identifying threats contained within encrypted network traffic poses a unique set of challenges. It is important to monitor this traffic for threats and malware, but do so in a way that maintains the integrity of the encryption. Because pattern matching cannot operate on encrypted data, previous approaches have leveraged observable metadata gathered from the flow, e.g., the flow's packet lengths and inter-arrival times. In this work, we extend the current state-of-the-art by considering a data omnia approach. To this end, we develop supervised machine learning models that take advantage of a unique and diverse set of network flow data features. These data features include TLS handshake meta data, DNS contextual flows linked to the encrypted flow, and the HTTP headers of HTTP contextual flows from the same source IP address within a 5 minute window. We begin by exhibiting the differences between malicious and benign traffic's use of TLS, DNS, and HTTP on millions of unique flows. This study is used to design the feature sets that have the most discriminatory power. We then show that incorporating this contextual information into a supervised learning system significantly increases performance at a 0.00% false discovery rate for the problem of classifying encrypted, malicious flows. We further validate our false positive rate on an independent, real-world dataset.
引用
收藏
页码:35 / 46
页数:12
相关论文
共 50 条
  • [21] Flow Based Algorithm for Malware Traffic Detection
    Skrzewski, Miroslaw
    COMPUTER NETWORKS, 2011, 160 : 271 - 280
  • [22] ANDROID MALWARE CLASSIFICATION APPROACH BASED ON HOST-LEVEL ENCRYPTED TRAFFIC SHAPING
    Zhou, Jie
    Niu, Weina
    Zhang, Xiaosong
    Peng, Yujie
    Wu, Hao
    Hu, Teng
    2020 17TH INTERNATIONAL COMPUTER CONFERENCE ON WAVELET ACTIVE MEDIA TECHNOLOGY AND INFORMATION PROCESSING (ICCWAMTIP), 2020, : 246 - 249
  • [23] POSTER: Identifying Dynamic Data Structures in Malware
    Rupprecht, Thomas
    Chen, Xi
    White, David H.
    Muehlberg, Jan Tobias
    Bos, Herbert
    Luettgen, Gerald
    CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 1772 - 1774
  • [24] On the Performance of Deep Learning Methods for Identifying Abnormal Encrypted Proxy Traffic
    Zhao, Hongce
    Zhang, Shunliang
    Qiao, Zhuang
    Huang, Xianjin
    Zhang, Xiaohui
    2022 IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, 2022, : 1416 - 1423
  • [25] Identifying P2P network activities on encrypted traffic
    Wang, Xiaolei
    Yang, Yuexiang
    He, Jie
    2014 IEEE 13TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM), 2014, : 893 - 899
  • [26] Identifying Skype Traffic in a Large-Scale Flow Data Repository
    Trammell, Brian
    Boschi, Elisa
    Procissi, Gregorio
    Callegari, Christian
    Dorfinger, Peter
    Schatzmann, Dominik
    TRAFFIC MONITORING AND ANALYSIS: THIRD INTERNATIONAL WORKSHOP, TMA 2011, 2011, 6613 : 72 - +
  • [27] Machine Learning for Encrypted Malware Traffic Classification: Accounting for Noisy Labels and Non-Stationarity
    Anderson, Blake
    McGrew, David
    KDD'17: PROCEEDINGS OF THE 23RD ACM SIGKDD INTERNATIONAL CONFERENCE ON KNOWLEDGE DISCOVERY AND DATA MINING, 2017, : 1723 - 1732
  • [28] An Approach Based on the Improved SVM Algorithm for Identifying Malware in Network Traffic
    Liu, Bo
    Chen, Jinfu
    Qin, Songling
    Zhang, Zufa
    Liu, Yisong
    Zhao, Lingling
    Chen, Jingyi
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [29] Malware Classification Method Based on Sequence of Traffic Flow
    Lim, Hyoyoung
    Yamaguchi, Yukiko
    Shimada, Hajime
    Takakura, Hiroki
    2015 INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY (ICISSP), 2015, : 230 - 237
  • [30] A Survey on TLS-Encrypted Malware Network Traffic Analysis Applicable to Security Operations Centers
    Oh, Chaeyeon
    Ha, Joonseo
    Roh, Heejun
    APPLIED SCIENCES-BASEL, 2022, 12 (01):