Malware detection by HTTPS traffic analysis

Paul Prasse, Gerrit Gruben, Lukas Machlika,Tomas Pevny,Michal Sofka,Tobias Scheffer

user-5ebe3c75d0b15254d6c50b36(2017)

引用 3|浏览13
暂无评分
摘要
In order to evade detection by network-traffic analysis, a growing proportion of malware uses the encrypted HTTPS protocol. We explore the problem of detecting malware on client computers based on HTTPS traffic analysis. In this setting, malware has to be detected based on the host IP address, ports, timestamp, and data volume information of TCP/IP packets that are sent and received by all the applications on the client. We develop a scalable protocol that allows us to collect network flows of known malicious and benign applications as training data and derive a malware-detection method based on a neural networks and sequence classification. We study the method’s ability to detect known and new, unknown malware in a largescale empirical study.
更多
查看译文
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要