...
首页> 外文期刊>Computers & Security >A flow-based approach for Trickbot banking trojan detection
【24h】

A flow-based approach for Trickbot banking trojan detection

机译:基于流程的Trickbot银行木马检测方法

获取原文
获取原文并翻译 | 示例
   

获取外文期刊封面封底 >>

       

摘要

Nowadays, online banking is an attractive way of carrying out financial operations such as ecommerce, e-banking, and e-payments without much effort or the need of any physical presence. This increasing popularity in online banking services and payment systems has created motivation for financial attackers to steal customer's credentials and money. Banking trojans have been a way of committing attacks on these financial institutions for more than a decade, and they have become one of the primary drivers of botnet traffic. However, the stealthy nature of financial botnets requires new techniques and novel systems for detection and analysis in order to prevent losses and to ultimately take the botnets down. TrickBot, which specifically threatens businesses in the financial sector and their customers, has been behind man-in-the-browser attacks since 2016. Its main goal is to steal online banking information from victims when they visit their banking websites.In this study, we utilize machine learning techniques to detect TrickBot malware infections and to identify TrickBot related traffic flows without having to analyze network packet payloads, the IP addresses, port numbers and protocol information. Since command and control server IPs are updated almost daily, identification of TrickBot related traffic flows without looking at specific IP addresses is significant. We adopt behavior-based classification that uses artifacts created by the malware during the dynamic analysis of TrickBot malware samples. We compare the performance results of four different state-of-the-art machine learning algorithms, Random Forest, Sequential Minimal Optimization, Multilayer Perceptron, and Logistic Model to identify TrickBot related flows and detect a TrickBot infection. Then, we optimize the proposed classifier via exploring the best hyperparameter and feature set selection. Looking at network packet identifiers such as packet length, packet and flag counts, and inter-arrival times, the Random Forest classifier identifies TrickBot related flows with 99.9534% accuracy, 91.7% true positive rate. (C) 2019 Elsevier Ltd. All rights reserved.
机译:如今,在线银行是一种进行金融业务(如电子商务,电子银行和电子支付)的有吸引力的方法,而无需付出太多努力或需要任何实际存在。在线银行服务和支付系统中这种日益普及的行为为金融攻击者窃取客户的凭证和金钱创造了动力。十多年来,银行木马一直是对这些金融机构进行攻击的一种方式,它们已成为僵尸网络流量的主要驱动力之一。但是,金融僵尸网络的隐秘性质需要用于检测和分析的新技术和新系统,以防止损失并最终使僵尸网络瘫痪。自2016年以来,TrickBot专门威胁着金融部门的企业及其客户,自2017年以来一直受到浏览器人的攻击。其主要目标是在受害者访问其银行网站时从受害者那里窃取在线银行信息。在本研究中,我们利用机器学习技术来检测TrickBot恶意软件感染并识别TrickBot相关的流量,而无需分析网络数据包有效负载,IP地址,端口号和协议信息。由于命令和控制服务器IP几乎每天都会更新,因此无需查看特定IP地址即可识别TrickBot相关流量。我们采用基于行为的分类,该分类使用在TrickBot恶意软件样本的动态分析过程中由恶意软件创建的工件。我们比较了四种不同的最新机器学习算法(随机森林,顺序最小优化,多层感知器和Logistic模型)的性能结果,以识别TrickBot相关流程并检测TrickBot感染。然后,我们通过探索最佳超参数和特征集选择来优化建议的分类器。通过查看网络数据包标识符(例如数据包长度,数据包和标志计数以及到达时间),Random Forest分类器以99.9534%的准确度,91.7%的真实阳性率识别与TrickBot相关的流。 (C)2019 Elsevier Ltd.保留所有权利。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号