DocumentCode
580259
Title
Adaptive Detection of Covert Communication in HTTP Requests
Author
Schwenk, Guido ; Rieck, Konrad
Author_Institution
Machine Learning Group, Tech. Univ. Berlin, Berlin, Germany
fYear
2011
fDate
6-7 Sept. 2011
Firstpage
25
Lastpage
32
Abstract
The infection of computer systems with malicious software is an enduring problem of computer security. Avoiding an infection in the first place is a hard task, as computer systems are often vulnerable to a multitude of attacks. However, to explore and control an infected system, an attacker needs to establish a communication channel with the victim. While such a channel can be easily established to an unprotected end host in the Internet, infiltrating a closed network usually requires passing an application-level gateway -- in most cases a web proxy -- which constitutes an ideal spot for detecting and blocking unusual outbound communication. This papers introduces DUMONT, a system for detecting covert outbound HTTP communication passing through a web proxy. DUMONT learns profiles of normal HTTP requests for each user of the proxy and adapts to individual web surfing characteristics. The profiles are inferred from a diverse set of features, covering the structure and content of outbound data, and allowing for automatically identifying tunnels and covert channels as deviations from normality. While this approach does not generally rule out sophisticated covert communication, it significantly improves on state-of-the-art methods and hardens networks against malware proliferation. This capability is demonstrated in an evaluation with 90 days of web traffic, where DUMONT uncovers the communication of malware, tunnels and backdoors with few false alarms.
Keywords
Web services; computer network security; internetworking; invasive software; telecommunication channels; transport protocols; DUMONT; HTTP request; Internet; Web proxy; Web surfing characteristics; adaptive covert communication detection; application level gateway; attack vulnerability; automatically tunnel identification; communication channel; computer security; computer system; covert channel; infected system; malicious software; malware; unusual outbound communication; Detectors; Entropy; Feature extraction; Malware; Software; Support vector machines; Training; Anomaly Detection; Covert Channels; Machine Learning; Malicious Software; Network Security;
fLanguage
English
Publisher
ieee
Conference_Titel
Computer Network Defense (EC2ND), 2011 Seventh European Conference on
Conference_Location
Gothenburg
Print_ISBN
978-1-4673-2116-7
Type
conf
DOI
10.1109/EC2ND.2011.12
Filename
6377758
Link To Document