首页> 外文会议>International symposium on research in attacks, intrusions and defenses >Error-Sensor: Mining Information from HTTP Error Traffic for Malware Intelligence
【24h】

Error-Sensor: Mining Information from HTTP Error Traffic for Malware Intelligence

机译:错误传感器:从HTTP错误流量中挖掘信息以进行恶意软件情报

获取原文

摘要

Malware often encounters network failures when it launches malicious activities, such as connecting to compromised servers that have been already taken down, connecting to malicious servers that are blocked based on access control policies in enterprise networks, or scanning/exploiting vulnerable web pages. To overcome such failures and improve the resilience in light of such failures, malware authors have employed various strategies, e.g., connecting to multiple backup servers or connecting to benign servers for initial network connectivity checks. These network failures and recovery strategies lead to distinguishing traits, which are newly discovered and thoroughly studied in this paper. We note that network failures caused by malware are quite different from the failures caused by benign users/software in terms of their failure patterns and recovery behavior patterns. In this paper, we present the results of the first large-scale measurement study investigating the different network behaviors of both benign user/software and malware in light of HTTP errors. By inspecting over 1 million HTTP logs generated by over 16,000 clients, we identify strong indicators of malicious activities derived from error provenance patterns, error generation patterns, and error recovery patterns. Based on the insights, we design a new system, Error-Sensor, to automatically detect traffic caused by malware from only HTTP errors and their surrounding successful requests. We evaluate Error-Sensor on a large scale of real-world web traces collected in an enterprise network. Error-Sensor achieves a detection rate of 99.79% at a false positive rate of 0.005% to identify HTTP errors generated by malware, and further, spots surreptitious malicious traffic (e.g., malware backup behavior) that was not caught by existing deployed intrusion detection systems.
机译:恶意软件在启动恶意活动时通常会遇到网络故障,例如连接到已被关闭的受感染服务器,连接到根据企业网络中的访问控制策略被阻止的恶意服务器,或扫描/利用易受攻击的网页。为了克服此类故障并鉴于此类故障提高弹性,恶意软​​件作者采用了各种策略,例如,连接到多个备份服务器或连接到良性服务器以进行初始网络连接检查。这些网络故障和恢复策略导致了特征的区别,这些特征是本文新发现和深入研究的。我们注意到,由恶意软件引起的网络故障与良性用户/软件引起的故障在故障模式和恢复行为模式方面有很大的不同。在本文中,我们提出了第一个大规模测量研究的结果,该研究针对HTTP错误对良性用户/软件和恶意软件的不同网络行为进行了调查。通过检查由16,000多个客户端生成的超过100万个HTTP日志,我们可以确定从错误源模式,错误生成模式和错误恢复模式派生的恶意活动的有力指标。基于这些见解,我们设计了一个新的系统Error-Sensor,以仅从HTTP错误及其周围的成功请求中自动检测到由恶意软件引起的流量。我们在企业网络中收集的大量实际Web跟踪上评估错误传感器。错误传感器以0.005%的误报率达到99.79%的检测率,以识别由恶意软件生成的HTTP错误,此外,还可以发现未被现有部署的入侵检测系统捕获的秘密恶意流量(例如,恶意软件备份行为) 。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号