A Learning Evasive Email-Based P2P-Like Botnet

被引:8
作者
Wang, Zhi [1 ,2 ]
Qin, Meilin [1 ]
Chen, Mengqi [1 ]
Jia, Chunfu [1 ,2 ,3 ]
Ma, Yong [2 ]
机构
[1] Nankai Univ, Coll Comp & Control Engn, Tianjin 300350, Peoples R China
[2] Civil Aviat Univ China, Informat Secur Evaluat Ctr Civil Aviat, Tianjin 300300, Peoples R China
[3] Key Lab High Trusted Informat Syst Hebei Prov, Baoding 071002, Peoples R China
基金
中国国家自然科学基金;
关键词
malware; botnet; learning evasion; command and control; COMMAND;
D O I
10.1109/CC.2018.8300268
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Nowadays, machine learning is widely used in malware detection system as a core component. The machine learning algorithm is designed under the assumption that all datasets follow the same underlying data distribution. But the real-world malware data distribution is not stable and changes with time. By exploiting the knowledge of the machine learning algorithm and malware data concept drift problem, we show a novel learning evasive botnet architecture and a stealthy and secure C&C mechanism. Based on the email communication channel, we construct a stealthy email-based P2P-like botnet that exploit the excellent reputation of email servers and a huge amount of benign email communication in the same channel. The experiment results show horizontal correlation learning algorithm is difficult to separate malicious email traffic from normal email traffic based on the volume features and time-related features with enough confidence. We discuss the malware data concept drift and possible defense strategies.
引用
收藏
页码:15 / 24
页数:10
相关论文
共 26 条
[1]  
[Anonymous], PROC THE 35TH IEEE S
[2]  
[Anonymous], ALGORITHMIC LEARNING
[3]  
[Anonymous], 2007, P HONEYNET PROJECT
[4]  
[Anonymous], 2013, P 2013 ACM WORKSH AR
[5]  
Antonakakis M, 2017, PROCEEDINGS OF THE 26TH USENIX SECURITY SYMPOSIUM (USENIX SECURITY '17), P1093
[6]   The weakest link revisited [J].
Arce, Iván .
IEEE Security and Privacy, 2003, 1 (02) :72-76
[7]   Scaling and Effectiveness of Email Masquerade Attacks: Exploiting Natural Language Generation [J].
Baki, Shahryar ;
Verma, Rakesh ;
Mukherjee, Arjun ;
Gnawali, Omprakash .
PROCEEDINGS OF THE 2017 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIA CCS'17), 2017, :469-482
[8]  
Biggio B., 2014, Proceedings of the 2014 workshop on artificial intelligent and security workshop, P27
[9]   Conformal Clustering and Its Application to Botnet Traffic [J].
Cherubin, Giovanni ;
Nouretdinov, Ilia ;
Gammerman, Alexander ;
Jordaney, Roberto ;
Wang, Zhi ;
Papini, Davide ;
Cavallaro, Lorenzo .
STATISTICAL LEARNING AND DATA SCIENCES, 2015, 9047 :313-322
[10]  
Chirita P.A., 2005, Proceedings of the 14th ACM international conference on Information and knowledge management, CIKM '05, P373