A Distance-Based Method for Building an Encrypted Malware Traffic Identification Framework

被引:17
|
作者
Liu, Jiayong [1 ]
Tian, Zhiyi [1 ]
Zheng, Rongfeng [2 ]
Liu, Liang [1 ]
机构
[1] Sichuan Univ, Coll Cybersecur, Chengdu 610065, Sichuan, Peoples R China
[2] Sichuan Univ, Coll Elect & Informat Engn, Chengdu 610065, Sichuan, Peoples R China
基金
中国国家自然科学基金;
关键词
Malware traffic identification; encryption traffic; unsupervised learning; supervised learning;
D O I
10.1109/ACCESS.2019.2930717
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The popularity of encryption method brings a great challenge to malware traffic identification. Traditional classes defined by expert experience are usually classified based on the host behaviors of malware, such as banking malware or ransomware, which are often irrelevant to its communication traffic behaviors. It leads to the fact that the boundaries of traffic feature dataset of different malware classes are fuzzy and make these traditional classes unhelpful for classification based on traffic features. Meanwhile, traditional machine learning-based encrypted malware traffic identification methods, such as using the multi-classification supervised learning model, are inefficient both in model training and detection, and its detection accuracy cannot meet the demand. In this paper, we propose a distance-based method, which utilizes unsupervised learning algorithm Gaussian mixture model (GMM) and ordering points to identify the clustering structure (OPTICS) to calculate the Distance between malwares and make use of the Distance to define the new malware class called FClass. Then, a set of models are trained by XGBoost algorithm to build an identification framework based on the FClass. The performance of the proposed method has been evaluated by comparing it with the other four methods. The results show that the proposed distance-based method is more efficient and accurate.
引用
收藏
页码:100014 / 100028
页数:15
相关论文
共 50 条
  • [1] Video traffic identification with a distribution distance-based feature selection
    Liu, Shuaili
    Zhang, Licheng
    Sun, Peifa
    Bao, Yingshuo
    Peng, Lizhi
    [J]. 2022 IEEE INTERNATIONAL PERFORMANCE, COMPUTING, AND COMMUNICATIONS CONFERENCE, IPCCC, 2022,
  • [2] A Clustering Method of Encrypted Video Traffic Based on Levenshtein Distance
    Yang, Luming
    Fu, Shaojing
    Luo, Yuchuan
    Wang, Yongjun
    Zhao, Wentao
    [J]. 2021 17TH INTERNATIONAL CONFERENCE ON MOBILITY, SENSING AND NETWORKING (MSN 2021), 2021, : 1 - 8
  • [3] Distance-Based Data Mining Over Encrypted Data
    Tex, Christine
    Schaeler, Martin
    Boehm, Klemens
    [J]. 2018 IEEE 34TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING (ICDE), 2018, : 1264 - 1267
  • [4] Identification method of encrypted traffic based on support vector machine
    Cheng G.
    Chen Y.
    [J]. Dongnan Daxue Xuebao (Ziran Kexue Ban)/Journal of Southeast University (Natural Science Edition), 2017, 47 (04): : 655 - 659
  • [5] A Distance-Based Trajectory Outlier Detection Method on Maritime Traffic Data
    Bao Lei
    Du Mingchao
    [J]. CONFERENCE PROCEEDINGS OF 2018 4TH INTERNATIONAL CONFERENCE ON CONTROL, AUTOMATION AND ROBOTICS (ICCAR), 2018, : 340 - 343
  • [6] Distance-based integration method for human skin type identification
    Srimaharaj, Wanus
    Chaising, Supansa
    [J]. Computers in Biology and Medicine, 2024, 178
  • [7] Extension of a distance-based fusion framework
    Grégoire, É
    [J]. MULTISENSOR, MULTISOURCE INFORMATION FUSION: ARCHITECTURES, ALGORITHMS, AND APPLICATONS 2004, 2004, 5434 : 282 - 286
  • [8] Browser Identification Based on Encrypted Traffic
    Liu, Changjiang
    Han, Jiesi
    Wei, Qiang
    [J]. PROCEEDINGS OF THE 2016 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, INFORMATION MANAGEMENT AND NETWORK SECURITY, 2016, 47 : 360 - 363
  • [9] Mahalanobis distance-based traffic matrix estimation
    Jiang, Dingde
    Wang, Xingwei
    Guo, Lei
    [J]. EUROPEAN TRANSACTIONS ON TELECOMMUNICATIONS, 2010, 21 (03): : 195 - 201
  • [10] FLOWGAN:Unbalanced network encrypted traffic identification method based on GAN
    Wang, ZiXuan
    Wang, Pan
    Zhou, Xiaokang
    Li, ShuHang
    Zhang, MoXuan
    [J]. 2019 IEEE INTL CONF ON PARALLEL & DISTRIBUTED PROCESSING WITH APPLICATIONS, BIG DATA & CLOUD COMPUTING, SUSTAINABLE COMPUTING & COMMUNICATIONS, SOCIAL COMPUTING & NETWORKING (ISPA/BDCLOUD/SOCIALCOM/SUSTAINCOM 2019), 2019, : 975 - 983