Graph based encrypted malicious traffic detection with hybrid analysis of multi-view features

被引:12
|
作者
Hong, Yueping [1 ]
Li, Qi [1 ]
Yang, Yanqing [1 ]
Shen, Meng [2 ]
机构
[1] Beijing Univ Posts & Telecommun, 10 Xitucheng Rd, Beijing, Peoples R China
[2] Beijing Inst Technol, 5 Yard,Zhong Guan Cun South St, Beijing, Peoples R China
基金
中国国家自然科学基金;
关键词
Malicious traffic; Encrypted traffic; SSL; TLS; Multi-view features; CLASSIFICATION; REPRESENTATION;
D O I
10.1016/j.ins.2023.119229
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
At present, the TLS cryptographic protocol is widely deployed. While protecting the security and integrity of transmitted information, it also makes the detection of malicious behavior more difficult. In recent years, researchers have proposed many encrypted malicious traffic detection methods. However, the existing approaches have some shortcomings. Firstly, although researchers have extracted multi-view features from different aspects, which can be divided into vectorized features based on feature engineering and image features based on original data, existing methods cannot fully integrate the features of different forms of expression. Secondly, most of the existing methods do not fully analyze the correlation between different encrypted traffic. Thirdly, the existing methods based on correlation analysis have low processing efficiency and cannot be applied to real networks. In the paper, we present MalDiscovery, a novel technique to discover encrypted malicious traffic to address all the above issues. For encrypted malicious traffic, MalDiscovery constructs an attribute KNN graph, in which encrypted sessions are used as nodes to construct a KNN graph according to the similarity of image features, and vectorized features are used as attributes of corresponding nodes. After that, the GraphSAGE model is used to collect relevant node information through correlation analysis to enrich the embeddings of each node. Finally, we achieve the accurate binary classification of nodes in the graph based on richer embeddings. We use extensive experiments to evaluate the proposed method, and the experiment results show that MalDiscovery can achieve an accuracy of about 99.9%, significantly outperforming all compared methods.
引用
收藏
页数:14
相关论文
共 50 条
  • [1] MVDet: Encrypted malware traffic detection via multi-view analysis
    Cui, Susu
    Han, Xueying
    Dong, Cong
    Li, Yun
    Liu, Song
    Lu, Zhigang
    Liu, Yuling
    Journal of Computer Security, 2024, 32 (06) : 533 - 555
  • [2] Malicious Word Document Detection Based On Multi-View Features Learning
    Lu Xiaofeng
    Wang Fei
    Shu Zifeng
    2019 28TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND NETWORKS (ICCCN), 2019,
  • [3] Flow Interaction Graph Analysis: Unknown Encrypted Malicious Traffic Detection
    Fu, Chuanpu
    Li, Qi
    Xu, Ke
    IEEE-ACM TRANSACTIONS ON NETWORKING, 2024, 32 (04) : 2972 - 2987
  • [4] A Multi-view Graph Learning Approach for Host-Based Malicious Behavior Detection
    Zhao, Chenfei
    Zhang, Zhe
    Wu, Tiejun
    Fan, Dunqiu
    DATABASE SYSTEMS FOR ADVANCED APPLICATIONS. DASFAA 2023 INTERNATIONAL WORKSHOPS, BDMS 2023, BDQM 2023, GDMA 2023, BUNDLERS 2023, 2023, 13922 : 283 - 299
  • [5] Multi-View Malicious Document Detection
    Lin, Jing-Yao
    Pao, Hsing-Kuo
    2013 CONFERENCE ON TECHNOLOGIES AND APPLICATIONS OF ARTIFICIAL INTELLIGENCE (TAAI), 2013, : 170 - 175
  • [6] Encrypted Malicious Traffic Detection Based on Graph Convolutional Network and Temporal Dissection
    Liu, Yuchen
    Wang, Shanshan
    Jin Au-yeung
    Chen, Zhenxiang
    PROCEEDINGS OF THE 2024 27 TH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN, CSCWD 2024, 2024, : 187 - 192
  • [7] Adversarial Malicious Encrypted Traffic Detection Based on Refined Session Analysis
    Li, Minghui
    Wu, Zhendong
    Chen, Keming
    Wang, Wenhai
    SYMMETRY-BASEL, 2022, 14 (11):
  • [8] TLS fingerprint for encrypted malicious traffic detection with attributed graph kernel
    Yu, Linxiao
    Tao, Jun
    Xu, Yifan
    Sun, Weice
    Wang, Zuyan
    COMPUTER NETWORKS, 2024, 247
  • [9] Multi-view encryption malicious traffic detection method combined with co-training
    Huo Y.
    Wu W.
    Zhao F.
    Wang Q.
    Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2023, 50 (04): : 139 - 147
  • [10] ECNet: Robust Malicious Network Traffic Detection With Multi-View Feature and Confidence Mechanism
    Han, Xueying
    Liu, Song
    Liu, Junrong
    Jiang, Bo
    Lu, Zhigang
    Liu, Baoxu
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 6871 - 6885