HeadPrint

Detecting anomalous communications through header-based application fingerprinting

Conference Paper (2020)
Author(s)

R. Bortolameotti (University of Twente)

Thijs Van Ede (University of Twente)

Andrea Continella (University of California)

Thomas Hupperich (Universität Münster)

Maarten H. Everts (University of Twente)

Reza Rafati (Bitdefender)

Willem Jonker (University of Twente)

P.H. Hartel (TU Delft - Cyber Security)

Andreas Peter (University of Twente)

Research Group
Cyber Security
Copyright
© 2020 Riccardo Bortolameotti, Thijs Van Ede, Andrea Continella, Thomas Hupperich, Maarten H. Everts, Reza Rafati, Willem Jonker, P.H. Hartel, Andreas Peter
DOI related publication
https://doi.org/10.1145/3341105.3373862
More Info
expand_more
Publication Year
2020
Language
English
Copyright
© 2020 Riccardo Bortolameotti, Thijs Van Ede, Andrea Continella, Thomas Hupperich, Maarten H. Everts, Reza Rafati, Willem Jonker, P.H. Hartel, Andreas Peter
Research Group
Cyber Security
Pages (from-to)
1696-1705
ISBN (print)
978-1-4503-6866-7
Reuse Rights

Other than for strictly personal use, it is not permitted to download, forward or distribute the text or part of it, without the consent of the author(s) and/or copyright holder(s), unless the work is under an open content license such as Creative Commons.

Abstract

Passive application fingerprinting is a technique to detect anomalous outgoing connections. By monitoring the network traffic, a security monitor passively learns the network characteristics of the applications installed on each machine, and uses them to detect the presence of new applications (e.g., malware infection). In this work, we propose HeadPrint, a novel passive fingerprinting approach that relies only on two orthogonal network header characteristics to distinguish applications, namely the order of the headers and their associated values. Our approach automatically identifies the set of characterizing headers, without relying on a predetermined set of header features. We implement HeadPrint, evaluate it in a real-world environment and we compare it with the state-of-the-art solution for passive application fingerprinting. We demonstrate our approach to be, on average, 20% more accurate and 30% more resilient to application updates than the state-of-the-art. Finally, we evaluate our approach in the setting of anomaly detection, and we show that HeadPrint is capable of detecting the presence of malicious communication, while generating significantly fewer false alarms than existing solutions.

Files

License info not available