Using Features of Encrypted Network Traffic to Detect Malware

被引:0
|
作者
Afzal, Zeeshan [1 ,2 ]
Brunstrom, Anna [2 ]
Lindskog, Stefan [2 ,3 ]
机构
[1] KTH Royal Inst Technol, Stockholm, Sweden
[2] Karlstad Univ, Karlstad, Sweden
[3] SINTEF Digital, Trondheim, Norway
来源
关键词
D O I
10.1007/978-3-030-70852-8_3
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Encryption on the Internet is as pervasive as ever. This has protected communications and enhanced the privacy of users. Unfortunately, at the same time malware is also increasingly using encryption to hide its operation. The detection of such encrypted malware is crucial, but the traditional detection solutions assume access to payload data. To overcome this limitation, such solutions employ traffic decryption strategies that have severe drawbacks. This paper studies the usage of encryption for malicious and benign purposes using large datasets and proposes a machine learning based solution to detect malware using connection and TLS metadata without any decryption. The classification is shown to be highly accurate with high precision and recall rates by using a small number of features. Furthermore, we consider the deployment aspects of the solution and discuss different strategies to reduce the false positive rate.
引用
收藏
页码:37 / 53
页数:17
相关论文
共 50 条
  • [41] CBSeq: A Channel-Level Behavior Sequence for Encrypted Malware Traffic Detection
    Cui, Susu
    Dong, Cong
    Shen, Meng
    Liu, Yuling
    Jiang, Bo
    Lu, Zhigang
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 5011 - 5025
  • [42] A Fast and Effective Detection of Mobile Malware Behavior Using Network Traffic
    Liu, Anran
    Chen, Zhenxiang
    Wang, Shanshan
    Peng, Lizhi
    Zhao, Chuan
    Shi, Yuliang
    [J]. ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2018, PT IV, 2018, 11337 : 109 - 120
  • [43] A Distance-Based Method for Building an Encrypted Malware Traffic Identification Framework
    Liu, Jiayong
    Tian, Zhiyi
    Zheng, Rongfeng
    Liu, Liang
    [J]. IEEE ACCESS, 2019, 7 : 100014 - 100028
  • [44] Classifying Malware Traffic Using Images and Deep Convolutional Neural Network
    Davis Jr, R. E.
    Xu, Jingsheng
    Roy, Kaushik
    [J]. IEEE ACCESS, 2024, 12 : 58031 - 58038
  • [45] Malware Traffic Classification Using Convolutional Neural Network for Representation Learning
    Wang, Wei
    Zhu, Ming
    Zeng, Xuewen
    Ye, Xiaozhou
    Sheng, Yiqiang
    [J]. 2017 31ST INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN), 2017, : 712 - 717
  • [46] MVDet: Encrypted malware traffic detection via multi-view analysis
    Cui, Susu
    Han, Xueying
    Dong, Cong
    Li, Yun
    Liu, Song
    Lu, Zhigang
    Liu, Yuling
    [J]. Journal of Computer Security, 2024, 32 (06) : 533 - 555
  • [47] Traffic Pattern Plot: Video Identification in Encrypted Network Traffic
    Kamal, Ali S.
    Bukhari, Syed M. A. H.
    Khan, Muhammad U. S.
    Maqsood, Tahir
    Fayyaz, Muhammad A. B.
    [J]. INTELLIGENT SUSTAINABLE SYSTEMS, WORLDS4 2022, VOL 2, 2023, 579 : 77 - 84
  • [48] Using entropy analysis to find encrypted and packed malware
    Lyda, Robert
    Hamrock, James
    [J]. IEEE SECURITY & PRIVACY, 2007, 5 (02) : 40 - 45
  • [49] Seeing Traffic Paths: Encrypted Traffic Classification With Path Signature Features
    Xu, Shi-Jie
    Geng, Guang-Gang
    Jin, Xiao-Bo
    Liu, Dong-Jie
    Weng, Jian
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2022, 17 : 2166 - 2181
  • [50] A CNN Based Encrypted Network Traffic Classifier
    Okonkwo, Zulu
    Foo, Ernest
    Li, Qinyi
    Hou, Zhe
    [J]. 2022 AUSTRALIAN COMPUTER SCIENCE WEEK (ACSW 2022), 2022, : 74 - 83