• DocumentCode
    580259
  • Title

    Adaptive Detection of Covert Communication in HTTP Requests

  • Author

    Schwenk, Guido ; Rieck, Konrad

  • Author_Institution
    Machine Learning Group, Tech. Univ. Berlin, Berlin, Germany
  • fYear
    2011
  • fDate
    6-7 Sept. 2011
  • Firstpage
    25
  • Lastpage
    32
  • Abstract
    The infection of computer systems with malicious software is an enduring problem of computer security. Avoiding an infection in the first place is a hard task, as computer systems are often vulnerable to a multitude of attacks. However, to explore and control an infected system, an attacker needs to establish a communication channel with the victim. While such a channel can be easily established to an unprotected end host in the Internet, infiltrating a closed network usually requires passing an application-level gateway -- in most cases a web proxy -- which constitutes an ideal spot for detecting and blocking unusual outbound communication. This papers introduces DUMONT, a system for detecting covert outbound HTTP communication passing through a web proxy. DUMONT learns profiles of normal HTTP requests for each user of the proxy and adapts to individual web surfing characteristics. The profiles are inferred from a diverse set of features, covering the structure and content of outbound data, and allowing for automatically identifying tunnels and covert channels as deviations from normality. While this approach does not generally rule out sophisticated covert communication, it significantly improves on state-of-the-art methods and hardens networks against malware proliferation. This capability is demonstrated in an evaluation with 90 days of web traffic, where DUMONT uncovers the communication of malware, tunnels and backdoors with few false alarms.
  • Keywords
    Web services; computer network security; internetworking; invasive software; telecommunication channels; transport protocols; DUMONT; HTTP request; Internet; Web proxy; Web surfing characteristics; adaptive covert communication detection; application level gateway; attack vulnerability; automatically tunnel identification; communication channel; computer security; computer system; covert channel; infected system; malicious software; malware; unusual outbound communication; Detectors; Entropy; Feature extraction; Malware; Software; Support vector machines; Training; Anomaly Detection; Covert Channels; Machine Learning; Malicious Software; Network Security;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Computer Network Defense (EC2ND), 2011 Seventh European Conference on
  • Conference_Location
    Gothenburg
  • Print_ISBN
    978-1-4673-2116-7
  • Type

    conf

  • DOI
    10.1109/EC2ND.2011.12
  • Filename
    6377758