Learning detectors of malicious web requests for intrusion detection in network traffic

02/08/2017
by   Lukas Machlica, et al.
0

This paper proposes a generic classification system designed to detect security threats based on the behavior of malware samples. The system relies on statistical features computed from proxy log fields to train detectors using a database of malware samples. The behavior detectors serve as basic reusable building blocks of the multi-level detection architecture. The detectors identify malicious communication exploiting encrypted URL strings and domains generated by a Domain Generation Algorithm (DGA) which are frequently used in Command and Control (C&C), phishing, and click fraud. Surprisingly, very precise detectors can be built given only a limited amount of information extracted from a single proxy log. This way, the computational requirements of the detectors are kept low which allows for deployment on a wide range of security devices and without depending on traffic context such as DNS logs, Whois records, webpage content, etc. Results on several weeks of live traffic from 100+ companies having 350k+ hosts show correct detection with a precision exceeding 95 hosts. In addition, a comparison with a signature and rule-based solution shows that our system is able to detect significant amount of new threats.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
09/08/2021

Unsupervised Detection and Clustering of Malicious TLS Flows

Malware abuses TLS to encrypt its malicious traffic, preventing examinat...
research
06/27/2018

An Extensive Evaluation of the Internet's Open Proxies

Open proxies forward traffic on behalf of any Internet user. Listed on o...
research
09/02/2020

Flow-based detection and proxy-based evasion of encrypted malware C2 traffic

State of the art deep learning techniques are known to be vulnerable to ...
research
08/29/2023

Assessing Cyclostationary Malware Detection via Feature Selection and Classification

Cyclostationarity involves periodic statistical variations in signals an...
research
06/01/2021

MalPhase: Fine-Grained Malware Detection Using Network Flow Data

Economic incentives encourage malware authors to constantly develop new,...
research
05/04/2022

Early Detection of Spam Domains with Passive DNS and SPF

Spam domains are sources of unsolicited mails and one of the primary veh...
research
04/17/2023

Detecting Domain-Generation Algorithm (DGA) Based Fully-Qualified Domain Names (FQDNs) with Shannon Entropy

Domain Name System (DNS) is the backbone of the Internet. However, threa...

Please sign up or login with your details

Forgot password? Click here to reset