kth.sePublications
Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Using Features of Encrypted Network Traffic to Detect Malware
KTH, School of Electrical Engineering and Computer Science (EECS), Computer Science, Network and Systems Engineering. Karlstad University Karlstad Sweden.ORCID iD: 0000-0001-9886-6651
2021 (English)In: 25th Nordic Conference on Secure IT Systems, NordSec 2020, Springer Science and Business Media Deutschland GmbH , 2021, p. 37-53Conference paper, Published paper (Refereed)
Abstract [en]

Encryption on the Internet is as pervasive as ever. This has protected communications and enhanced the privacy of users. Unfortunately, at the same time malware is also increasingly using encryption to hide its operation. The detection of such encrypted malware is crucial, but the traditional detection solutions assume access to payload data. To overcome this limitation, such solutions employ traffic decryption strategies that have severe drawbacks. This paper studies the usage of encryption for malicious and benign purposes using large datasets and proposes a machine learning based solution to detect malware using connection and TLS metadata without any decryption. The classification is shown to be highly accurate with high precision and recall rates by using a small number of features. Furthermore, we consider the deployment aspects of the solution and discuss different strategies to reduce the false positive rate.

Place, publisher, year, edition, pages
Springer Science and Business Media Deutschland GmbH , 2021. p. 37-53
Keywords [en]
Large dataset, Malware, Turing machines, False positive rates, High-precision, Highly accurate, Large datasets, Network traffic, Payload data, Protected communications, Cryptography
National Category
Computer Sciences
Identifiers
URN: urn:nbn:se:kth:diva-308511DOI: 10.1007/978-3-030-70852-8_3ISI: 000927605100003Scopus ID: 2-s2.0-85103538148OAI: oai:DiVA.org:kth-308511DiVA, id: diva2:1636285
Conference
23 November 2020 through 24 November 2020
Note

Part of proceedings: ISBN 9783030708511, QC 20230118

Available from: 2022-02-09 Created: 2022-02-09 Last updated: 2023-09-21Bibliographically approved

Open Access in DiVA

No full text in DiVA

Other links

Publisher's full textScopus

Authority records

Afzal, Zeeshan

Search in DiVA

By author/editor
Afzal, Zeeshan
By organisation
Network and Systems Engineering
Computer Sciences

Search outside of DiVA

GoogleGoogle Scholar

doi
urn-nbn

Altmetric score

doi
urn-nbn
Total: 218 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf