Identifying Encrypted Malware Traffic with Contextual Flow Data

被引:142
|
作者
Anderson, Blake [1 ]
McGrew, David [1 ]
机构
[1] Cisco, San Jose, CA 95134 USA
来源
AISEC'16: PROCEEDINGS OF THE 2016 ACM WORKSHOP ON ARTIFICIAL INTELLIGENCE AND SECURITY | 2016年
关键词
Encryption; Malware; Machine Learning; Transport Layer Security; Network Monitoring;
D O I
10.1145/2996758.2996768
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Identifying threats contained within encrypted network traffic poses a unique set of challenges. It is important to monitor this traffic for threats and malware, but do so in a way that maintains the integrity of the encryption. Because pattern matching cannot operate on encrypted data, previous approaches have leveraged observable metadata gathered from the flow, e.g., the flow's packet lengths and inter-arrival times. In this work, we extend the current state-of-the-art by considering a data omnia approach. To this end, we develop supervised machine learning models that take advantage of a unique and diverse set of network flow data features. These data features include TLS handshake meta data, DNS contextual flows linked to the encrypted flow, and the HTTP headers of HTTP contextual flows from the same source IP address within a 5 minute window. We begin by exhibiting the differences between malicious and benign traffic's use of TLS, DNS, and HTTP on millions of unique flows. This study is used to design the feature sets that have the most discriminatory power. We then show that incorporating this contextual information into a supervised learning system significantly increases performance at a 0.00% false discovery rate for the problem of classifying encrypted, malicious flows. We further validate our false positive rate on an independent, real-world dataset.
引用
收藏
页码:35 / 46
页数:12
相关论文
共 50 条
  • [31] HALNet: A Hybrid Deep Learning Model for Encrypted C&C Malware Traffic Detection
    Li, Ruiyuan
    Song, Zehui
    Xie, Wei
    Zhang, Chengwei
    Zhong, Guohui
    Pei, Xiaobing
    NETWORK AND SYSTEM SECURITY, NSS 2021, 2021, 13041 : 326 - 339
  • [32] Classify Traffic Rather Than Flow: Versatile Multi-Flow Encrypted Traffic Classification With Flow Clustering
    Chen, Zihan
    Cheng, Guang
    Wei, Zijun
    Niu, Dandan
    Fu, Nan
    IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2024, 21 (02): : 1446 - 1466
  • [33] Encrypted Network Traffic Classification: A data driven approach
    Zhang, Zhongkai
    Liu, Lei
    Lu, Xudong
    Yan, Zhongmin
    Li, Hui
    2020 IEEE INTL SYMP ON PARALLEL & DISTRIBUTED PROCESSING WITH APPLICATIONS, INTL CONF ON BIG DATA & CLOUD COMPUTING, INTL SYMP SOCIAL COMPUTING & NETWORKING, INTL CONF ON SUSTAINABLE COMPUTING & COMMUNICATIONS (ISPA/BDCLOUD/SOCIALCOM/SUSTAINCOM 2020), 2020, : 706 - 712
  • [34] Identifying Smartphone Malware Using Data Mining Technology
    Chiang, Hsiu-Sen
    Tsaur, Woei-Jiunn
    2011 20TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS (ICCCN), 2011,
  • [35] Static Malware Analysis in Encrypted Domain
    Hwang, Taeyoon
    Yoon, Ji Won
    2019 10TH INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY CONVERGENCE (ICTC): ICT CONVERGENCE LEADING THE AUTONOMOUS FUTURE, 2019, : 47 - 52
  • [36] Contextual Oblivious Similarity Searching for Encrypted Data on Cloud Storage Services
    Lavnis, Sneha Umesh
    Elango, Divyaa Manimaran
    Gonzalez-Velez, Horacio
    2018 IEEE 8TH INTERNATIONAL SYMPOSIUM ON CLOUD AND SERVICE COMPUTING (SC2), 2018, : 77 - 82
  • [37] Identifying IoT devices and events based on packet length from encrypted traffic
    Pinheiro, Antonio J.
    Bezerra, Jeandro de M.
    Burgardt, Caio A. P.
    Campelo, Divanilson R.
    COMPUTER COMMUNICATIONS, 2019, 144 : 8 - 17
  • [38] Encrypted Linear Contextual Bandit
    Garcelon, Evrard
    Perchet, Vianney
    Pirotta, Matteo
    INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND STATISTICS, VOL 151, 2022, 151
  • [39] Experimental Evaluation of Malware Family Classification Methods from Sequential Information of TLS-Encrypted Traffic
    Ha, Joonseo
    Roh, Heejun
    ELECTRONICS, 2021, 10 (24)
  • [40] AS-DMF: A Lightweight Malware Encrypted Traffic Detection Method Based on Active Learning and Feature Selection
    Huo, Yuehua
    Zhao, Faqi
    Zhang, Hangsheng
    Zhuang, Shangyuan
    Sun, Jiyan
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022