Learning communication patterns for malware discovery in HTTPs data

被引:15
|
作者
Kohout, Jan [1 ,2 ]
Komarek, Tornag [1 ,2 ]
Cchc, Premysl [3 ]
Bodnar, Jan [3 ]
Lokoc, Jakub [3 ]
机构
[1] Czech Tech Univ, Fac Elect Engn, Prague, Czech Republic
[2] Cisco Syst Inc, Cognit Res Ctr, Prague, Czech Republic
[3] Charles Univ Prague, Dept Software Engn, SIRET Res Grp, Fac Math & Phys, Prague, Czech Republic
关键词
Hadoop; HTTPs data; Malware detection; GMM; NEURAL-NETWORKS;
D O I
10.1016/j.eswa.2018.02.010
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Encrypted communication on the Internet using the HTTPs protocol represents a challenging task for network intrusion detection systems. While it significantly helps to preserve users' privacy, it also limits a detection system's ability to understand the traffic and effectively identify malicious activities. In this work, we propose a method for modeling and representation of encrypted communication from logs of web communication. The idea is based on introducing communication snapshots of individual users' activity that model contextual information of the encrypted requests. This helps to compensate the information hidden by the encryption. We then propose statistical descriptors of the communication snapshots that can be consumed by various machine learning algorithms for either supervised or unsupervised analysis of the data. In the experimental evaluation, we show that the presented approach can be used even on a large corpus of network traffic logs as the process of creation of the descriptors can be effectively implemented on a Hadoop cluster. (C) 2018 Elsevier Ltd. All rights reserved.
引用
收藏
页码:129 / 142
页数:14
相关论文
共 50 条
  • [1] Malware Detection based on HTTPS Characteristic via Machine Learning
    Calderon, Paul
    Hasegawa, Hirokazu
    Yamaguchi, Yukiko
    Shimada, Hajime
    [J]. ICISSP: PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2018, : 410 - 417
  • [2] End-node Fingerprinting for Malware Detection on HTTPS Data
    Komarek, Tomas
    Somol, Petr
    [J]. PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2017), 2017,
  • [3] A Discovery of Sequential Attack Patterns of Malware in Botnets
    Rosyid, Nur Rohman
    Ohrui, Masayuki
    Kikuchi, Hiroaki
    Sooraksa, Pitikhate
    Terada, Masato
    [J]. IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN AND CYBERNETICS (SMC 2010), 2010,
  • [4] Feature Extraction and Malware Detection on Large HTTPS Data Using MapReduce
    Cech, Premysl
    Kohout, Jan
    Lokoc, Jakub
    Komarek, Tomas
    Marousek, Jakub
    Pevny, Tomas
    [J]. SIMILARITY SEARCH AND APPLICATIONS, SISAP 2016, 2016, 9939 : 311 - 324
  • [5] Towards secure mobile learning. Visual discovery of malware patterns in android apps
    Buono, Paolo
    Carella, Pietro
    [J]. 2019 23RD INTERNATIONAL CONFERENCE INFORMATION VISUALISATION (IV): BIOMEDICAL VISUALIZATION AND GEOMETRIC MODELLING & IMAGING, 2019, : 364 - 369
  • [6] Malware detection using image representation of malware data and transfer learning
    Rustam, Furqan
    Ashraf, Imran
    Jurcut, Anca Delia
    Bashir, Ali Kashif
    Bin Zikria, Yousaf
    [J]. JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2023, 172 : 32 - 50
  • [7] Communication in collaborative discovery learning
    Saab, N
    van Joolingen, WR
    van Hout-Wolters, BHAM
    [J]. BRITISH JOURNAL OF EDUCATIONAL PSYCHOLOGY, 2005, 75 : 603 - 621
  • [8] Nonparametric Discovery of Learning Patterns and Autism Subgroups from Therapeutic Data
    Vellanki, Pratibha
    Thi Duong
    Venkatesh, Svetha
    Dinh Phung
    [J]. 2014 22ND INTERNATIONAL CONFERENCE ON PATTERN RECOGNITION (ICPR), 2014, : 1828 - 1833
  • [9] Big Data: Deep Learning for detecting Malware
    Masabo, Emmanuel
    Kaawaase, Kyanda Swaib
    Sansa-Otim, Julianne
    [J]. 2018 IEEE/ACM SYMPOSIUM ON SOFTWARE ENGINEERING IN AFRICA (SEIA), 2018, : 20 - 26
  • [10] Patterns in Malware Designed for Data Espionage and Backdoor Creation
    Javed, A.
    Akhlaq, M.
    [J]. 2015 12TH INTERNATIONAL BHURBAN CONFERENCE ON APPLIED SCIENCES AND TECHNOLOGY (IBCAST), 2015, : 338 - 342