Anomaly Detection Algorithms for Malware Traffic Analysis using Tamper Resistant Features
- Dr. Patrick McDaniel
Anomaly Detection Algorithms for Malware Traffic Analysis using - - PowerPoint PPT Presentation
Anomaly Detection Algorithms for Malware Traffic Analysis using Tamper Resistant Features Dr. Patrick McDaniel Berkay Celik Fall 2015 Introduction Motivation Related Work Data Approach Experimental Results Comparison
Page
2
Page
3
Image credit: http://www.vblaze.com/
Page
4
Packet Packet
extraction?
Page
5
Page
6
Page
7
(as a total 16 different malware families)
Image credit: http://www.vblaze.com/
Page
Feature space (13 features, all continuous):
8
packet time
least a byte of data payload
packets
window
packets
total packet bytes
minimum packet size
Total number
frame bytes divided flow duration
Page
Feature selection:
9
Efficient application identification and the temporal and spatial stability of classification schema, Computer Networks, 2009
flow based classification. Queen Mary and Westfield College, Department
Computer Science, 2005
Nelms, Roberto Perdisci, and Mustaque Ahamad. Execscent: Mining for new C&C domains in live networks with adaptive control protocol templates. In USENIX Security,2013
Page
Overview of Framework
10
Steps to achieve the goal
Page
nearest cluster centre
squares probabilistic classifier
11
Steps to achieve the goal Image from official Scikit-learn, One-class SVM
Page
12
Steps to achieve the goal
Page
13
Steps to achieve the goal
Page
14
Steps to achieve the goal
Page
15
Steps to achieve the goal (More details of ROC curve for each fold is given in report)
Page
classified malicious samples (true positive rate) against the percentage of legitimate samples falsely classified as malicious (false positive rate)
16
Steps to achieve the goal Kaiten vs Neris malware (More details of ROC curve for each fold is given in report)
Page
17
Steps to achieve the goal
Page
Number of malware flows classified as legitimate HTTP(S)
18
Steps to achieve the goal
Number of legitimate HTTP(S) flows classified as malware
Page
Confusion Matrix after cross validation
19
Steps to achieve the goal
Base Classifier (majority class) vs. C4.5 algorithm
(More details are given in report)
Page
20
Steps to achieve the goal Log scale plot of incoming and outgoing ratio of packet bytes
Page
21
Steps to achieve the goal
Feature Projection to two Dimensional Space using PCA and K-means Clustering
Sality form in similar feature range, and most of their instances are assigned to the same clusters
Page
from not only packets, but also IP addresses, DNS features, HTTP requests etc.
C&C domains in live networks with adaptive control protocol
are already infected and generates traffic. More challenging...
Kruegel,
largescale networks. In Proc. Network and Distributed System Security Symposium (NDSS), 2014
proof features
22
Steps to achieve the goal
Page
malware heartbeat traffic after blending into legitimate applications
traffic from legitimate traffic by only using tamper resistant features
malware families
evasion attack
feature space, and multiple source of information to alleviate the false negatives by improving the underlying feature space
23
Steps to achieve the goal
Page
F.Kocak, D. J. Miller, and G. Kesidis. Detecting anomalous latent classes in a batch of network traffic flows. In Proc. Information Sciences and Systems (CISS), 2014
24
Steps to achieve the goal Wei Li, Marco Canini, Andrew W Moore, and Raffaele Bolla. Efficient application identification and the temporal and spatial stability of classification schema, Computer Networks, 2009
Gu, R. Perdisci, J. Zhang, W. Lee, et al. Botminer: Clustering analysis of network traffic for protocol-and structure-independent botnet
25