Using side channel TCP features for real-time detection of malware connections

被引:9
作者
Stergiopoulos, George [1 ]
Chronopoulou, Georgia [1 ]
Bitsikas, Evangelos [1 ]
Tsalis, Nikolaos [1 ]
Gritzalis, Dimitris [1 ]
机构
[1] Athens Univ Econ & Business, Dept Informat, Informat Secur & Crit Infrastruct Protect INFOSEC, Athens, Greece
关键词
Malware traffic; malware detection; machine learning; defacement; CART; botnet; reverse shells; trojan;
D O I
10.3233/JCS-191286
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
During the past years, deep packet inspection has been prevalent in network intrusion detection systems. Most solutions employ complex algorithms to analyze the intended behaviour and underlying characteristics of packets and their payloads, in an effort to detect and prevent malicious users and software from communicating over business intranets and wider networks. Still, there are multiple issues that inhibit their success rate. Most signature-based security software is plagued by false positives and/or false negatives. On the other hand, behavioral-based solutions achieve better detection rates but need to analyze large amounts of traffic. In this article, we present a real-time network traffic monitoring system that implements machine learning over side channel characteristics of TCP network packets to distinguish normal from malicious TCP sessions, even when encryption is in place. We test in university networks and test multiple different types of traffic. We show that, our approach (i) requires notably less information to achieve similar (if not better) detection rates, (ii) works over encrypted traffic as well, and (iii) has notably low false positives and false negatives in everyday case study scenarios.
引用
收藏
页码:507 / 520
页数:14
相关论文
共 33 条
  • [31] Timofeev R., 2004, Classification and regression trees (CART) theory and applications
  • [32] Spot me if you can: Uncovering spoken phrases in encrypted VoIP conversations
    Wright, Charles V.
    Ballard, Lucas
    Coull, Scott E.
    Monrose, Fabian
    Masson, Gerald M.
    [J]. PROCEEDINGS OF THE 2008 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, 2008, : 35 - +
  • [33] Yen TF, 2008, LECT NOTES COMPUT SC, V5137, P207