Automated Generation of Models for Fast and Precise Detection of HTTP-Based Malware

被引:0
作者
Zarras, Apostolis [1 ]
Papadogiannakis, Antonis [2 ]
Gawlik, Robert [1 ]
Holz, Thorsten [1 ]
机构
[1] Ruhr Univ Bochum, Bochum, Germany
[2] FORTH ICS, Bochum, Germany
来源
2014 TWELFTH ANNUAL INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST) | 2014年
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Malicious software and especially botnets are among the most important security threats in the Internet. Thus, the accurate and timely detection of such threats is of great importance. Detecting machines infected with malware by identifying their malicious activities at the network level is an appealing approach, due to the ease of deployment. Nowadays, the most common communication channels used by attackers to control the infected machines are based on the HTTP protocol. To evade detection, HTTP-based malware adapt their behavior to the communication patterns of the benign HTTP clients, such as web browsers. This poses significant challenges to existing detection approaches like signature-based and behavioral-based detection systems. In this paper, we propose BO THOUND: a novel approach to precisely detect HTTP-based malware at the network level. The key idea is that implementations of the HTTP protocol by different entities have small but perceivable differences. Building on this observation, BO THOUND automatically generates models for malicious and benign requests and classifies at real time the HTTP traffic of a monitored network. Our evaluation results demonstrate that BO THOUND outperforms prior work on identifying HTTP-based botnets, being able to detect a large variety of real-world HTTP-based malware, including advanced persistent threats used in targeted attacks, with a very low percentage of classification errors.
引用
收藏
页码:249 / 256
页数:8
相关论文
共 31 条
[1]  
Abu Rajab M., 2006, ACM SIGCOMM C INT ME
[2]  
Anderson D. S., 2007, USENIX SEC S USENIX SEC S
[3]  
[Anonymous], USENIX S NETW SYST D
[4]  
Antonakakis M., 2012, USENIX SEC S
[5]  
Bayer U., 2006, ANN C EUR I COMP ANT
[6]   Man-in-the-Middle Attack to the HTTPS Protocol [J].
Callegati, Franco ;
Cerroni, Walter ;
Ramilli, Marco .
IEEE SECURITY & PRIVACY, 2009, 7 (01) :78-81
[7]  
Cooke E., 2005, USENIX WORKSH STEPS
[8]  
Coskun B., 2010, ANN COMP SEC APPL C
[9]  
Cuckoo Sandbox, AUT MALW AN
[10]  
Francois J., 2011, IFIP NETW C