You Do (Not) Belong Here: Detecting DPI Evasion Attacks with Context Learning

被引:11
作者
Zhu, Shitong [1 ]
Li, Shasha [1 ]
Wang, Zhongjie [1 ]
Chen, Xun [2 ]
Qian, Zhiyun [1 ]
Krishnamurthy, Srikanth, V [1 ]
Chan, Kevin S. [3 ]
Swami, Ananthram [3 ]
机构
[1] Univ Calif Riverside, Riverside, CA 92521 USA
[2] Samsung Res Amer, Beijing, Peoples R China
[3] US Army Res Lab, Adelphi, MD USA
来源
PROCEEDINGS OF THE 16TH INTERNATIONAL CONFERENCE ON EMERGING NETWORKING EXPERIMENTS AND TECHNOLOGIES, CONEXT 2020 | 2020年
关键词
D O I
10.1145/3386367.3431311
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As Deep Packet Inspection (DPI) middleboxes become increasingly popular, a spectrum of adversarial attacks have emerged with the goal of evading such middleboxes. Many of these attacks exploit discrepancies between the middlebox network protocol implementations, and the more rigorous/complete versions implemented at end hosts. These evasion attacks largely involve subtle manipulations of packets to cause different behaviours at DPI and end hosts, to cloak malicious network traffic that is otherwise detectable. With recent automated discovery, it has become prohibitively challenging to manually curate rules for detecting these manipulations. In this work, we propose CLAP, the first fully-automated, unsupervised ML solution to accurately detect and localize DPI evasion attacks. By learning what we call the packet context, which essentially captures inter-relationships across both (1) different packets in a connection; and (2) different header fields within each packet, from benign traffic traces only, CLAP can detect and pinpoint packets that violate the benign packet contexts (which are the ones that are specially crafted for evasion purposes). Our evaluations with 73 state-of-the-art DPI evasion attacks show that CLAP achieves an Area Under the Receiver Operating Characteristic Curve (AUC-ROC) of 0.963, an Equal Error Rate (EER) of only 0.061 in detection, and an accuracy of 94.6% in localization. These results suggest that CLAP can be a promising tool for thwarting DPI evasion attacks.
引用
收藏
页码:183 / 197
页数:15
相关论文
共 26 条
[1]   Jaal: Towards Network Intrusion Detection at ISP Scale [J].
Aqil, Azeem ;
Khalil, Karim ;
Atya, Ahmed O. F. ;
Papalexakis, Evangelos E. ;
Krishnamurthy, Srikanth V. ;
Jaeger, Trent ;
Ramakrishnan, K. K. ;
Yu, Paul ;
Swami, Ananthram .
CONEXT'17: PROCEEDINGS OF THE 2017 THE 13TH INTERNATIONAL CONFERENCE ON EMERGING NETWORKING EXPERIMENTS AND TECHNOLOGIES, 2017, :134-146
[2]   Geneva: Evolving Censorship Evasion Strategies [J].
Bock, Kevin ;
Hughey, George ;
Qiang, Xiao ;
Levin, Dave .
PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19), 2019, :2199-2214
[3]   Recursive Lattice Search: Hierarchical Heavy Hitters Revisited [J].
Cho, Kenjiro .
PROCEEDINGS OF THE 2017 INTERNET MEASUREMENT CONFERENCE (IMC'17), 2017, :283-289
[4]  
Cho Kyunghyun, 2014, P 2014 C EMP METH NA, P1724
[5]   Scaling in Internet Traffic: A 14 Year and 3 Day Longitudinal Study, With Multiscale Analyses and Random Projections [J].
Fontugne, Romain ;
Abry, Patrice ;
Fukuda, Kensuke ;
Veitch, Darryl ;
Cho, Kenjiro ;
Borgnat, Pierre ;
Wendt, Herwig .
IEEE-ACM TRANSACTIONS ON NETWORKING, 2017, 25 (04) :2152-2165
[6]  
Handley M, 2001, USENIX ASSOCIATION PROCEEDINGS OF THE 10TH USENIX SECURITY SYMPOSIUM, P115
[7]   Detection and Recognition of Atomic Evasions Against Network Intrusion Detection/Prevention Systems [J].
Jia Jingping ;
Chen Kehua ;
Chen Jia ;
Zhou Dengwen ;
Ma Wei .
IEEE ACCESS, 2019, 7 :87816-87826
[8]   lib.erate, (n) : A library for exposing (traffic-classification) rules and avoiding them efficiently [J].
Li, Fangfan ;
Razaghpanah, Abbas ;
Kakhki, Arash Molavi ;
Niaki, Arian Akhavan ;
Choffnes, David ;
Gill, Phillipa ;
Mislove, Alan .
PROCEEDINGS OF THE 2017 INTERNET MEASUREMENT CONFERENCE (IMC'17), 2017, :128-141
[9]  
Li SS, 2020, Arxiv, DOI arXiv:2007.09763
[10]   Structure Inference Net: Object Detection Using Scene-Level Context and Instance-Level Relationships [J].
Liu, Yong ;
Wang, Ruiping ;
Shan, Shiguang ;
Chen, Xilin .
2018 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR), 2018, :6985-6994