DocumentCode :
3596329
Title :
Tor-based malware and Tor connection detection
Author :
Ghafir, Ibrahim ; Svoboda, Jakub ; Prenosil, Vaclav
Author_Institution :
Fac. of Inf., Masaryk Univ., Brno, Czech Republic
fYear :
2014
Firstpage :
1
Lastpage :
6
Abstract :
Anonymous communication networks, like Tor, partially protect the confidentiality of user traffic by encrypting all communications within the overlay network. However, Tor is not only used for good; a great deal of the traffic in the Tor networks is in fact port scans, hacking attempts, exfiltration of stolen data and other forms of online criminality. The anonymity network Tor is often misused by hackers and criminals in order to remotely control hacked computers. In this paper we present our methodology for detecting any connection to or from Tor network. Our detection method is based on a list of Tor servers. We process the network traffic and match the source and destination IP addresses for each connection with Tor servers list. The list of Tor servers is automatically updated each day and the detection is in the real time. We applied our methodology on campus live traffic and showed that it can automatically detect Tor connections in the real time. We also applied our methodology on packet capture (pcap) files which contain real and long-lived malware traffic and we proved that our methodology can successfully detect Tor connections.
Keywords :
invasive software; IP addresses; Tor connection detection; Tor-based malware; anonymous communication networks; malware traffic; Cyber attacks; Tor network; bonet; intrusion detection system; malware;
fLanguage :
English
Publisher :
iet
Conference_Titel :
Frontiers of Communications, Networks and Applications (ICFCNA 2014 - Malaysia), International Conference on
Print_ISBN :
978-1-78561-072-1
Type :
conf
DOI :
10.1049/cp.2014.1411
Filename :
7141237
Link To Document :
بازگشت