Proceedings of the 13th ACM Workshop on Artificial Intelligence and Security 2020
DOI: 10.1145/3411508.3421379
|View full text |Cite
|
Sign up to set email alerts
|

Flow-based Detection and Proxy-based Evasion of Encrypted Malware C2 Traffic

Abstract: State of the art deep learning techniques are known to be vulnerable to evasion attacks where an adversarial sample is generated from a malign sample and misclassified as benign. Detection of encrypted malware command and control traffic based on TCP/IP flow features can be framed as a learning task and is thus vulnerable to evasion attacks. However, unlike e.g. in image processing where generated adversarial samples can be directly mapped to images, going from flow features to actual TCP/IP packets requires c… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 21 publications
(8 citation statements)
references
References 11 publications
0
8
0
Order By: Relevance
“…We do not present results for elapsed time since the start of the flow because its results are worse than IAT. Previous work [33] show that tampering with IAT and elapsed time since the flow start using a proxy yields a performance decrease. We thus only consider packet size with direction and byte burst as relevant features for the remainder of the paper.…”
Section: Feature Comparisonmentioning
confidence: 97%
“…We do not present results for elapsed time since the start of the flow because its results are worse than IAT. Previous work [33] show that tampering with IAT and elapsed time since the flow start using a proxy yields a performance decrease. We thus only consider packet size with direction and byte burst as relevant features for the remainder of the paper.…”
Section: Feature Comparisonmentioning
confidence: 97%
“…Generation This is the task of creating content that fits a target distribution which, in some cases, requires realism in the eyes of a human. Examples of generation for offensive uses include the tampering of media evidence [155,192], intelligent password guessing [75,89], and traffic shaping to avoid detection [85,166]. Deepfakes are another instance of offensive AI in this category.…”
Section: Attacks Using Aimentioning
confidence: 99%
“…AI-based tools are programs which performs a specific task in adversary's arsenal. For example, a tool for intelligently predicting passwords [75,89], obfuscating malware code [59], traffic shaping for evasion [85,121,166], puppeting a persona [154], and so on. These tools are typically in the form of a machine learning model.…”
Section: New Attack Goals In Addition To the Conventional Attack Goal...mentioning
confidence: 99%
See 2 more Smart Citations