Identifying Encrypted Malware Traffic with Contextual Flow Data

被引:142
|
作者
Anderson, Blake [1 ]
McGrew, David [1 ]
机构
[1] Cisco, San Jose, CA 95134 USA
来源
AISEC'16: PROCEEDINGS OF THE 2016 ACM WORKSHOP ON ARTIFICIAL INTELLIGENCE AND SECURITY | 2016年
关键词
Encryption; Malware; Machine Learning; Transport Layer Security; Network Monitoring;
D O I
10.1145/2996758.2996768
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Identifying threats contained within encrypted network traffic poses a unique set of challenges. It is important to monitor this traffic for threats and malware, but do so in a way that maintains the integrity of the encryption. Because pattern matching cannot operate on encrypted data, previous approaches have leveraged observable metadata gathered from the flow, e.g., the flow's packet lengths and inter-arrival times. In this work, we extend the current state-of-the-art by considering a data omnia approach. To this end, we develop supervised machine learning models that take advantage of a unique and diverse set of network flow data features. These data features include TLS handshake meta data, DNS contextual flows linked to the encrypted flow, and the HTTP headers of HTTP contextual flows from the same source IP address within a 5 minute window. We begin by exhibiting the differences between malicious and benign traffic's use of TLS, DNS, and HTTP on millions of unique flows. This study is used to design the feature sets that have the most discriminatory power. We then show that incorporating this contextual information into a supervised learning system significantly increases performance at a 0.00% false discovery rate for the problem of classifying encrypted, malicious flows. We further validate our false positive rate on an independent, real-world dataset.
引用
收藏
页码:35 / 46
页数:12
相关论文
共 50 条
  • [41] Real time malware detection in encrypted network traffic using machine learning with time based features
    Singh, Abhay Pratap
    Singh, Mahendra
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2023, 26 (03): : 841 - 850
  • [42] LTI: Encrypted Traffic Classification Framework Considering Data Drift
    Kurapov, Anton
    Shamsimukhametov, Danil
    Liubogoshchev, Mikhail
    Khorov, Evgeny
    2024 IEEE INTERNATIONAL BLACK SEA CONFERENCE ON COMMUNICATIONS AND NETWORKING, BLACKSEACOM 2024, 2024, : 352 - 355
  • [43] Deep Learning for Encrypted Traffic Classification and Unknown Data Detection
    Pathmaperuma, Madushi H.
    Rahulamathavan, Yogachandran
    Dogan, Safak
    Kondoz, Ahmet M.
    SENSORS, 2022, 22 (19)
  • [44] Learning from Imbalanced Data for Encrypted Traffic Identification Problem
    Ly Vu
    Dong Van Tra
    Quang Uy Nguyen
    PROCEEDINGS OF THE SEVENTH SYMPOSIUM ON INFORMATION AND COMMUNICATION TECHNOLOGY (SOICT 2016), 2016, : 147 - 152
  • [45] Adversarial Sample Attack and Defense Method for Encrypted Traffic Data
    Ding, Yi
    Zhu, Guiqin
    Chen, Dajiang
    Qin, Xue
    Cao, Mingsheng
    Qin, Zhiguang
    IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2022, 23 (10) : 18024 - 18039
  • [46] Contextual Route Recommendation System in Heterogeneous Traffic Flow
    Nasution, Surya Michrandi
    Husni, Emir
    Kuspriyanto, Kuspriyanto
    Yusuf, Rahadian
    Yahya, Bernardo Nugroho
    SUSTAINABILITY, 2021, 13 (23)
  • [47] Automatic Detection and Analysis of Encrypted Messages in Malware
    Zhao, Ruoxu
    Gu, Dawu
    Li, Juanru
    Zhang, Yuanyuan
    INFORMATION SECURITY AND CRYPTOLOGY, INSCRYPT 2013, 2014, 8567 : 101 - 117
  • [48] Malware Detection Using Power Consumption and Network Traffic Data
    Jimenez, Jarilyn M. Hernandez
    Goseva-Popstojanova, Katerina
    2019 2ND INTERNATIONAL CONFERENCE ON DATA INTELLIGENCE AND SECURITY (ICDIS 2019), 2019, : 53 - 59
  • [49] Malware communication in smart factories: A network traffic data set
    Brenner, Bernhard
    Fabini, Joachim
    Offermanns, Magnus
    Semper, Sabrina
    Zseby, Tanja
    COMPUTER NETWORKS, 2024, 255
  • [50] HMC: A Novel Mechanism for Identifying Encrypted P2P Thunder Traffic
    Li, Chenglong
    Xue, Yibo
    Dong, Yingfei
    Wang, Dongsheng
    2010 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE GLOBECOM 2010, 2010,