TGPrint: Attack fingerprint classification on encrypted network traffic based graph convolution attention networks

被引:2
作者
Wang, Leiqi [1 ,2 ]
Ma, Xiu [1 ,2 ]
Li, Ning [1 ]
Lv, Qiujian [1 ]
Wang, Yan [1 ,2 ]
Huang, Weiqing [1 ,2 ]
Chen, Haiyan [3 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, Beijing, Peoples R China
[2] Univ Chinese Acad Sci, Sch Cyber Secur, Beijing, Peoples R China
[3] Chinese Res Inst Environm Sci, Beijing, Peoples R China
关键词
Attack classification; Encrypted network traffic; Unseen attack; Attack graph; Graph neural networks;
D O I
10.1016/j.cose.2023.103466
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Nowadays, most network traffic is encrypted, which protects user privacy but hides attack traces, further hindering identifying attacks to inspect traffic packages. Machine Learning (ML) methods are widely applied to attack classification on encrypted traffic owing to no need for manual analysis. However, existing studies only concentrate on basic statistical features and cannot obtain the crucial attack behaviors hiding in the encrypted traffic. Worse still, attackers constantly update attack vectors to evade detection, which means outdated features extracted from historical traffic fail to recognize unseen attacks. As a solution, we propose an attack classification approach, attack fingerprint based on graphs of time-window (TGPrint). We first filter normal traffic flows using ML models to eliminate the impact of useless, noisy data for attack classification and maintain suspicious traffic. Then, we create attack graphs to depict interaction behaviors of attack-victim hosts from suspicious traffic containing crucial attack behaviors. Besides, we divide a specific duration for each attack to precisely elaborate attack graphs, where temporal, statistical, and aggregate features are extracted to portray attack behaviors. Finally, we utilize Graph Neural Networks (GNNs) to mine and grasp the crucial behavior patterns from attack graphs to generate fingerprints and classify attacks, even unseen attacks. Extensive experiments are conducted on well-known datasets to verify our approach. It achieves a precision of 99% in attack classification on encrypted traffic, an average higher than other ML methods of 50%. Meanwhile, it classifies unseen attacks with an average accuracy of over 80% and has a strong robustness to false positives.
引用
收藏
页数:12
相关论文
共 42 条
  • [1] Machine Learning for Traffic Analysis: A Review
    Alqudah, Nour
    Yaseen, Qussai
    [J]. 11TH INTERNATIONAL CONFERENCE ON AMBIENT SYSTEMS, NETWORKS AND TECHNOLOGIES (ANT) / THE 3RD INTERNATIONAL CONFERENCE ON EMERGING DATA AND INDUSTRY 4.0 (EDI40) / AFFILIATED WORKSHOPS, 2020, 170 : 911 - 916
  • [2] Deciphering malware's use of TLS (without decryption)
    Anderson, Blake
    Paul, Subharthi
    McGrew, David
    [J]. JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2018, 14 (03): : 195 - 211
  • [3] Machine Learning for Encrypted Malware Traffic Classification: Accounting for Noisy Labels and Non-Stationarity
    Anderson, Blake
    McGrew, David
    [J]. KDD'17: PROCEEDINGS OF THE 23RD ACM SIGKDD INTERNATIONAL CONFERENCE ON KNOWLEDGE DISCOVERY AND DATA MINING, 2017, : 1723 - 1732
  • [4] [Anonymous], 2022, Abuse
  • [5] [Anonymous], 2019, White Paper, P1
  • [6] [Anonymous], 1999, The TLS Protocol-Version 1.0, DOI 10.17487/RFC2246
  • [7] Malware Detection Using Network Traffic Analysis in Android Based Mobile Devices
    Arora, Anshul
    Garg, Shree
    Peddoju, Sateesh K.
    [J]. 2014 EIGHTH INTERNATIONAL CONFERENCE ON NEXT GENERATION MOBILE APPS, SERVICES AND TECHNOLOGIES (NGMAST), 2014, : 66 - 71
  • [8] Bar R., 2022, IEEE ACCESS
  • [9] C.I. for Cybersecurity, 2017, Intrusion detection evaluation dataset (cicids2017)
  • [10] Graph representation learning: a survey
    Chen, Fenxiao
    Wang, Yun-Cheng
    Wang, Bin
    Kuo, C. -C. Jay
    [J]. APSIPA TRANSACTIONS ON SIGNAL AND INFORMATION PROCESSING, 2020, 9