Detecting Ransomware in Encrypted Web Traffic

被引:1
|
作者
Modi, Jaimin [1 ]
Traore, Issa [1 ]
Ghaleb, Asem [1 ]
Ganame, Karim [2 ]
Ahmed, Sherif [3 ]
机构
[1] Univ Victoria, ECE Dept, Victoria, BC, Canada
[2] StreamScan, 2300 Rue Sherbrooke E, Montreal, PQ, Canada
[3] Univ Windsor, Comp Sci Dept, Victoria, BC, Canada
关键词
Ransomware detection; Encrypted web traffic; Machine learning; Network traffic;
D O I
10.1007/978-3-030-45371-8_22
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
To date, only a small amount of research has focused on detecting ransomware at the network level, and none of the published proposals have addressed the challenges raised by the fact that an increasing number of ransomware are using encrypted channels for communication with the command and control (C&C) server, mainly, over the HTTPS protocol. Despite the limited amount of ransomware-specific data available in network traffic, network-level detection represents a valuable extension of system-level detection as this could provide early indication of ransomware activities and allow disrupting such activities before serious damage can take place. To address the aforementioned gap, we propose, in the current paper, a new approach for detecting ransomware in encrypted network traffic that leverages network connections, certificate information and machine learning. We leverage an existing feature model developed for generalmalware and develop a robust network flow behavior analysis model using machine learning that separates effectively ransomware traffic from normal traffic. We study three different classifiers: random forest, SVM and logistic regression. Experimental evaluation on a diversified dataset yields a detection rate of 99.9% and a false positive rate of 0% for random forest, the best performing of the three classifiers.
引用
收藏
页码:345 / 353
页数:9
相关论文
共 50 条
  • [1] Detecting Encrypted Botnet Traffic
    Zhang, Han
    Papadopoulos, Christos
    Massey, Dan
    [J]. 2013 IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (INFOCOM WKSHPS), 2013, : 163 - 168
  • [2] Detecting Encrypted Botnet Traffic
    Zhang, Han
    Papadopoulos, Christos
    Massey, Dan
    [J]. 2013 PROCEEDINGS IEEE INFOCOM, 2013, : 3453 - 3458
  • [3] Traffic Classification in an Increasingly Encrypted Web
    Akbari, Iman
    Salahuddin, Mohammad A.
    Ven, Leni
    Limam, Noura
    Boutaba, Raouf
    Mathieu, Bertrand
    Moteau, Stephanie
    Tuffin, Stephane
    [J]. COMMUNICATIONS OF THE ACM, 2022, 65 (10) : 75 - 83
  • [4] On the Practicality of Detecting Anomalies with Encrypted Traffic in AMI
    Berthier, Robin
    Urbina, David I.
    Cardenas, Alvaro A.
    Guerrero, Michael
    Herberg, Ulrich
    Jetcheva, Jorjeta G.
    Mashima, Daisuke
    Huh, Jun Ho
    Bobba, Rakesh B.
    [J]. 2014 IEEE INTERNATIONAL CONFERENCE ON SMART GRID COMMUNICATIONS (SMARTGRIDCOMM), 2014, : 890 - 895
  • [5] Detecting Encrypted Traffic: A Machine Learning Approach
    Cha, Seunghun
    Kim, Hyoungshick
    [J]. INFORMATION SECURITY APPLICATIONS, WISA 2016, 2017, 10144 : 54 - 65
  • [6] Increasing Web Service Availability by Detecting Application-Layer DDoS Attacks in Encrypted Traffic
    Zolotukhin, Mikhail
    Hamalainen, Timo
    Kokkonen, Tero
    Siltanen, Jarmo
    [J]. 2016 23RD INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS (ICT), 2016,
  • [7] Ransomware Encrypted Your Files but You Restored Them from Network Traffic
    Berrueta, Eduardo
    Morato, Daniel
    Magana, Eduardo
    Izal, Mikel
    [J]. 2018 2ND CYBER SECURITY IN NETWORKING CONFERENCE (CSNET), 2018,
  • [8] Ransomware: Analysis of Encrypted Files
    Madani, Houria
    Ouerdi, Noura
    Azizi, Abdelmalek
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2023, 14 (01) : 213 - 217
  • [9] Statistical identification of encrypted web browsing traffic
    Sun, QX
    Simon, DR
    Wang, YM
    Russell, W
    Padmanabhan, VN
    Qiu, L
    [J]. 2002 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2002, : 19 - 30
  • [10] Detecting Spam Bots by Sequential Analysis of Encrypted Traffic
    Lin, Po-Ching
    Chen, Chi-Fang
    Chiou, Pin-Ren
    [J]. JOURNAL OF INTERNET TECHNOLOGY, 2016, 17 (06): : 1279 - 1286