Adaptive Traffic Fingerprinting for Darknet Threat Intelligence

08/03/2018
by   Hamish Haughey, et al.
0

Darknet technology such as Tor has been used by various threat actors for organising illegal activities and data exfiltration. As such, there is a case for organisations to block such traffic, or to try and identify when it is used and for what purposes. However, anonymity in cyberspace has always been a domain of conflicting interests. While it gives enough power to nefarious actors to masquerade their illegal activities, it is also the cornerstone to facilitate freedom of speech and privacy. We present a proof of concept for a novel algorithm that could form the fundamental pillar of a darknet-capable Cyber Threat Intelligence platform. The solution can reduce anonymity of users of Tor, and considers the existing visibility of network traffic before optionally initiating targeted or widespread BGP interception. In combination with server HTTP response manipulation, the algorithm attempts to reduce the candidate data set to eliminate client-side traffic that is most unlikely to be responsible for server-side connections of interest. Our test results show that MITM manipulated server responses lead to expected changes received by the Tor client. Using simulation data generated by shadow, we show that the detection scheme is effective with false positive rate of 0.001, while sensitivity detecting non-targets was 0.016+-0.127. Our algorithm could assist collaborating organisations willing to share their threat intelligence or cooperate during investigations.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
03/28/2021

Data-Driven Threat Hunting Using Sysmon

Threat actors can be persistent, motivated and agile, and leverage a div...
research
07/15/2019

Hands Off my Database: Ransomware Detection in Databases through Dynamic Analysis of Query Sequences

Ransomware is an emerging threat which imposed a $ 5 billion loss in 201...
research
10/26/2020

Enabling Efficient Cyber Threat Hunting With Cyber Threat Intelligence

Log-based cyber threat hunting has emerged as an important solution to c...
research
09/05/2019

Using Cyber Threat Intelligence to Prevent Malicious Known Traffic in a SDN Physical Testbed

Since the use of applications and communication tools has increased, one...
research
08/18/2020

Fingerprinting Search Keywords over HTTPS at Scale

The possibility of fingerprinting the search keywords issued by a user o...
research
09/30/2022

Embedded System Performance Analysis for Implementing a Portable Drowsiness Detection System for Drivers

Drowsiness on the road is a widespread problem with fatal consequences; ...
research
08/06/2018

Know Abnormal, Find Evil: Frequent Pattern Mining for Ransomware Threat Hunting and Intelligence

Emergence of crypto-ransomware has significantly changed the cyber threa...

Please sign up or login with your details

Forgot password? Click here to reset