MalPhase: Fine-Grained Malware Detection Using Network Flow Data

06/01/2021
by   Michal Piskozub, et al.
0

Economic incentives encourage malware authors to constantly develop new, increasingly complex malware to steal sensitive data or blackmail individuals and companies into paying large ransoms. In 2017, the worldwide economic impact of cyberattacks is estimated to be between 445 and 600 billion USD, or 0.8 global GDP. Traditionally, one of the approaches used to defend against malware is network traffic analysis, which relies on network data to detect the presence of potentially malicious software. However, to keep up with increasing network speeds and amount of traffic, network analysis is generally limited to work on aggregated network data, which is traditionally challenging and yields mixed results. In this paper we present MalPhase, a system that was designed to cope with the limitations of aggregated flows. MalPhase features a multi-phase pipeline for malware detection, type and family classification. The use of an extended set of network flow features and a simultaneous multi-tier architecture facilitates a performance improvement for deep learning models, making them able to detect malicious flows (>98 respective malware type (>93 robust features and denoising autoencoders allows MalPhase to perform well on samples with varying amounts of benign traffic mixed in. Finally, MalPhase detects unseen malware samples with performance comparable to that of known samples, even when interlaced with benign flows to reflect realistic network environments.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
09/08/2021

Unsupervised Detection and Clustering of Malicious TLS Flows

Malware abuses TLS to encrypt its malicious traffic, preventing examinat...
research
12/07/2022

RADAR: Effective Network-based Malware Detection based on the MITRE ATT CK Framework

MITRE ATT CK is a widespread ontology that specifies tactics, techniqu...
research
03/26/2021

ShellCore: Automating Malicious IoT Software Detection by Using Shell Commands Representation

The Linux shell is a command-line interpreter that provides users with a...
research
10/04/2020

IoT Malware Network Traffic Classification using Visual Representation and Deep Learning

With the increase of IoT devices and technologies coming into service, M...
research
01/26/2023

New Approach to Malware Detection Using Optimized Convolutional Neural Network

Cyber-crimes have become a multi-billion-dollar industry in the recent y...
research
02/08/2017

Learning detectors of malicious web requests for intrusion detection in network traffic

This paper proposes a generic classification system designed to detect s...
research
02/16/2018

WebEye - Automated Collection of Malicious HTTP Traffic

With malware detection techniques increasingly adopting machine learning...

Please sign up or login with your details

Forgot password? Click here to reset