Identifying Encrypted Malware Traffic with Contextual Flow Data

被引:142
作者
Anderson, Blake [1 ]
McGrew, David [1 ]
机构
[1] Cisco, San Jose, CA 95134 USA
来源
AISEC'16: PROCEEDINGS OF THE 2016 ACM WORKSHOP ON ARTIFICIAL INTELLIGENCE AND SECURITY | 2016年
关键词
Encryption; Malware; Machine Learning; Transport Layer Security; Network Monitoring;
D O I
10.1145/2996758.2996768
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Identifying threats contained within encrypted network traffic poses a unique set of challenges. It is important to monitor this traffic for threats and malware, but do so in a way that maintains the integrity of the encryption. Because pattern matching cannot operate on encrypted data, previous approaches have leveraged observable metadata gathered from the flow, e.g., the flow's packet lengths and inter-arrival times. In this work, we extend the current state-of-the-art by considering a data omnia approach. To this end, we develop supervised machine learning models that take advantage of a unique and diverse set of network flow data features. These data features include TLS handshake meta data, DNS contextual flows linked to the encrypted flow, and the HTTP headers of HTTP contextual flows from the same source IP address within a 5 minute window. We begin by exhibiting the differences between malicious and benign traffic's use of TLS, DNS, and HTTP on millions of unique flows. This study is used to design the feature sets that have the most discriminatory power. We then show that incorporating this contextual information into a supervised learning system significantly increases performance at a 0.00% false discovery rate for the problem of classifying encrypted, malicious flows. We further validate our false positive rate on an independent, real-world dataset.
引用
收藏
页码:35 / 46
页数:12
相关论文
共 37 条
  • [1] Chains of Distrust: Towards Understanding Certificates Used for Signing Malicious Applications
    Alrawi, Omar
    Mohaisen, Aziz
    [J]. PROCEEDINGS OF THE 25TH INTERNATIONAL CONFERENCE ON WORLD WIDE WEB (WWW'16 COMPANION), 2016, : 451 - 456
  • [2] [Anonymous], ARXIV E PRINTS
  • [3] [Anonymous], 2010, NSDI
  • [4] Antonakakis M., 2012, PROC USENIX C SECUR, P491
  • [5] Antonakakis Manos., 2011, USENIX Security Symposium, P16
  • [6] Bilge L, 2011, NETW DISTR SYST SEC
  • [7] Man-in-the-Middle Attack to the HTTPS Protocol
    Callegati, Franco
    Cerroni, Walter
    Ramilli, Marco
    [J]. IEEE SECURITY & PRIVACY, 2009, 7 (01) : 78 - 81
  • [8] Claise B., 2004, Tech. Rep.
  • [9] Claise B, 2013, RFC 7011
  • [10] DIERKS T., 2008, 5246 RFC