首页> 外文会议>International conference on information security and cryptology >BotTokenizer: Exploring Network Tokens of HTTP-Based Botnet Using Malicious Network Traces
【24h】

BotTokenizer: Exploring Network Tokens of HTTP-Based Botnet Using Malicious Network Traces

机译:BotTokenizer:使用恶意网络跟踪来探索基于HTTP的僵尸网络的网络令牌

获取原文

摘要

Nowadays, malicious software and especially botnets leverage HTTP protocol as their communication and command (C&C) channels to connect to the attackers and control compromised clients. Due to its large popularity and facility across firewall, the malicious traffic can blend with legitimate traffic and remains undetected. While network signature-based detection systems and models show extraordinary advantages, such as high detection efficiency and accuracy, their scalability and automatization still need to be improved. In this work, we present BotTokenizer, a novel network signature-based detection system that aims to detect malicious HTTP C&C traffic. BotTokenizer automatically learns recognizable network tokens from known HTTP C&C communications from different botnet families by using words segmentation technologies. In essence, BotTokenizer implements a coarse-grained network signature generation prototype only relying on Uniform Resource Locators (URLs) in HTTP requests. Our evaluation results demonstrate that BotTokenizer performs very well on identifying HTTP-based botnets with an acceptable classification errors.
机译:如今,恶意软件(尤其是僵尸网络)利用HTTP协议作为其通信和命令(C&C)通道来连接到攻击者并控制受感染的客户端。由于其广泛的流行性和跨防火墙的便利性,恶意流量可以与合法流量混合,并且未被检测到。尽管基于网络签名的检测系统和模型显示出非凡的优势,例如较高的检测效率和准确性,但仍需要改进其可伸缩性和自动化程度。在这项工作中,我们介绍了BotTokenizer,这是一种新颖的基于网络签名的检测系统,旨在检测恶意HTTP C&C流量。 BotTokenizer使用分词技术从不同僵尸网络家族的已知HTTP C&C通信中自动学习可识别的网络令牌。本质上,BotTokenizer仅依靠HTTP请求中的统一资源定位符(URL)来实现粗粒度网络签名生成原型。我们的评估结果表明,BotTokenizer在识别具有可接受分类错误的基于HTTP的僵尸网络方面表现非常出色。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号