DECANTeR

DEteCtion of Anomalous outbouNd HTTP Traffic by Passive Application Fingerprinting

Conference Paper (2017)
Author(s)

R. Bortolameotti (University of Twente)

Thijs van Ede (University of Twente)

Marco Caselli (Siemens AG)

M. H. Everts (University of Twente, TNO)

PH Hartel (TU Delft - Cyber Security)

Rick Hofstede (RedSocks Security B.V.)

Willem Jonker (University of Twente)

A. Peter (University of Twente)

Research Group
Cyber Security
Copyright
© 2017 Riccardo Bortolameotti, Thijs van Ede, Marco Caselli, M.H. Everts, P.H. Hartel, Rick Hofstede, Willem Jonker, A. Peter
DOI related publication
https://doi.org/10.1145/3134600.3134605
More Info
expand_more
Publication Year
2017
Language
English
Copyright
© 2017 Riccardo Bortolameotti, Thijs van Ede, Marco Caselli, M.H. Everts, P.H. Hartel, Rick Hofstede, Willem Jonker, A. Peter
Research Group
Cyber Security
Volume number
Part F132521
Pages (from-to)
373-386
ISBN (electronic)
978-1-4503-5345-8
Reuse Rights

Other than for strictly personal use, it is not permitted to download, forward or distribute the text or part of it, without the consent of the author(s) and/or copyright holder(s), unless the work is under an open content license such as Creative Commons.

Abstract

We present DECANTeR, a system to detect anomalous outbound HTTP communication, which passively extracts fingerprints for each application running on a monitored host. The goal of our system is to detect unknown malware and backdoor communication indicated by unknown fingerprints extracted from a host's network traffic. We evaluate a prototype with realistic data from an international organization and datasets composed of malicious traffic. We show that our system achieves a false positive rate of 0.9% for 441 monitored host machines, an average detection rate of 97.7%, and that it cannot be evaded by malware using simple evasion techniques such as using known browser user agent values. We compare our solution with DUMONT [24], the current state-of-The-Art IDS which detects HTTP covert communication channels by focusing on benign HTTP traffic. The results show that DECANTeR outperforms DUMONT in terms of detection rate, false positive rate, and even evasion-resistance. Finally, DECANTeR detects 96.8% of information stealers in our dataset, which shows its potential to detect data exfiltration.

Files

P373_bortolameotti.pdf
(pdf | 1.66 Mb)
License info not available