Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/1030083.1030100acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
Article

Web tap: detecting covert web traffic

Published: 25 October 2004 Publication History

Abstract

As network security is a growing concern, system administrators lock down their networks by closing inbound ports and only allowing outbound communication over selected protocols such as HTTP. Hackers, in turn, are forced to find ways to communicate with compromised workstations by tunneling through web requests. While several tools attempt to analyze inbound traffic for denial-of-service and other attacks on web servers, Web Tap's focus is on detecting attempts to send significant amounts of information out via HTTP tunnels to rogue Web servers from within an otherwise firewalled network. A related goal of Web Tap is to help detect spyware programs, which often send out personal data to servers using HTTP transactions and may open up security holes in the network. Based on the analysis of HTTP traffic over a training period, we designed filters to help detect anomalies in outbound HTTP traffic using metrics such as request regularity, bandwidth usage, inter-request delay time, and transaction size. Subsequently, Web Tap was evaluated on several available HTTP covert tunneling programs as well as a test backdoor program, which creates a remote shell from outside the network to a protected machine using only outbound HTTP transactions. Web Tap's filters detected all the tunneling programs tested after modest use. Web Tap also analyzed the activity of approximately thirty faculty and students who agreed to use it as a proxy server over a 40 day period. It successfully detected a significant number of spyware and aware programs. This paper presents the design of Web Tap, results from its evaluation, as well as potential limits to Web Tap's capabilities.

References

[1]
Ad-Aware, http://www.lavasoftusa.com/software/adaware/, 2004.]]
[2]
D. Barbara, R. Goel, and S. Jajodia. Mining Malicious Data Corruption with Hidden Markov Models. 16th Annual IFIP WG 11.3 Working Conference on Data and Application Security, July 2002.]]
[3]
P. Barford, A. Bestavros, A. Bradley, and M. Crovella, Changes in Web client access patterns: Characteristics and caching implications, BU Computer Science Technical Report, BUCS-TR-1998-023, 1998.]]
[4]
J. Berman, Prepared Statement of Jerry Berman, President, the Center For Democracy & Technology On the SPY BLOCK Act, Before the Senate Committee On Commerce, Science, And Transportation Subcommittee on Communication, March 2004.]]
[5]
BlackICE PC Protection, http://blackice.iss.net/, 2004.]]
[6]
CERT Vulnerability Note VN-98.07, http://www.cert .org/vulnotes/VN-98.07.backorifice.html, October 1998.]]
[7]
CERT Advisory CA-2003-22 Multiple Vulnerabilities in Microsoft Internet Explorer,http://www.cert.org/advisories/ CA-2003-22.html, August 2003.]]
[8]
B. Cheswick, An Evening with Berferd in which a cracker is Lured, Endured, and Studied, USENIX proceedings, January 1990.]]
[9]
D.E. Denning, An Intrusion Detection Model. IEEE Transactions on Software Engineering, 13(2):222--232, February 1987.]]
[10]
B. Duska, D. Marwood, and M. J. Feeley, The measured access characteristics of World Wide Web client proxy caches, Proc. of USENIX Symposium on Internet Technology and Systems, December 1997.]]
[11]
A. Dyatlov, Firepass, http://www.gray-world.net/pr_firepass. shtml, 2004.]]
[12]
A. Dyatlov, S. Castro, Wsh 'Web Shell', http://www.gray-world.net/pr_wsh.shtml, 2004.]]
[13]
EyeOnSecurity, http://eyeonsecurity.org/advisories/Gator/, 2002.]]
[14]
R. Fielding, J. Gettys, J. C. Mogul, H. Frystyk, L. Masinter, P. Leach and T. Berners-Lee. Hypertext Transfer Protocol HTTP/1.1, RFC 2616, June 1999.]]
[15]
S. Forrest, A. Hofmeyr, A. Somayaji, and T. A. Longstaff, A Sense of Self for Unix Processes, Proc. of the IEEE Symposium on Security and Privacy, pp. 120--128, May 1996.]]
[16]
A.K. Ghosh, J. Wanken, and F. Charron. Detecting Anomalous and Unknown Intrusions Against Programs. Proc. of the Annual Computer Security Applications Conference (ACSAC'98), pp. 259--267, December 1998.]]
[17]
S. Hisao, Tiny HTTP Proxy, http://mail.python.org/ pipermail/python-list/2003-June/168957.html, June 2003.]]
[18]
Hopster, http://www.hopster.com/, 2004.]]
[19]
H.S. Javitz and A. Valdes. The SRI IDES Statistical Anomaly Detector, Proc. of the IEEE Symposium on Security and Privacy, May 1991.]]
[20]
T. Kelly, Thin-client Web access patterns: Measurements from a cache-busting proxy, Computer Communications, 25(4):357--366, March 2002.]]
[21]
C. Kruegel, T. Toth, and E. Kirda. Service-specific Anomaly Detection for Network Intrusion Detection. Symposium on Applied Computing (SAC), ACM Scientific Press, March 2002.]]
[22]
C. Kruegel and G. Vigna, Anomaly Detection of Web-based Attacks, Proceedings of ACM CCS'03, pp. 251--261, 2003.]]
[23]
T. Lane and C.E. Brodley, Temporal sequence learning and data reduction for anomaly detection, Proc. of the 5th ACM Conference on Computer and Communications Security, pp. 150--158, 1998.]]
[24]
J. McHugh, "Covert Channel Analysis", Handbook for the computer Security Certification of Trusted Systems, 1995.]]
[25]
MIMEsweeper,http://www.mimesweeper.com/products/msw/msw_web/default.aspx, 2004.]]
[26]
I. S. Moskowitz and M. H. Kang, Covert channels --- Here to stay?, Proc. of COMPASS '94, pp. 235--243, 1994.]]
[27]
V. Paxson. Bro: A System for Detecting Network Intruders in Real-Time. Proc. of the 7th Usenix Security Symposium, January 1998.]]
[28]
V. Paxson and S. Floyd, "Wide-Area Traffic: The Failure of Poisson Modeling," IEEE/ACMTransactions on Networking, 3(3), pp. 226--244, June 1995.]]
[29]
F. A. P. Petitcolas, R. J. Anderson, and M. G. Kuhn, Information hiding---A survey, Proceedings of the IEEE, special issue on protection of multimedia content, 87(7):1062-1078, July 1999.]]
[30]
S. Saroiu, S. D. Gribble, and H. M. Levy, Measurement and Analysis of Spyware in a University Environment, Proc. of the First Symposium on Networked Systems Design and Implementation, pp. 141--153, March 2004.]]
[31]
M. Roesch. Snort - Lightweight Intrusion Detection for Networks. Proc. of the USENIX LISA '99 Conference, November 1999.]]
[32]
Spybot - Search and Destroy, http://www.safer-networking.org/, 2004.]]
[33]
SpywareBlaster,http://www.javacoolsoftware.com/ spywareblaster.html/, 2004.]]
[34]
K. Tan and R. Maxion. Why 6? Defining the Operational Limits of Stide, an Anomaly-Based Intrusion Detector. Proc. of the IEEE Symposium on Security and Privacy, pp. 188--202, May 2002.]]
[35]
Websense, http://www.websense.com/products/about/ howitworks/index.cfm, 2004.]]
[36]
N. Ye, Y. Zhang, and C.M. Borror. Robustness of Markov chain model for cyber attack detection. IEEE Transactions on Reliability, 52(3), September 2003.]]
[37]
Y. Zhang, V. Paxson, "Detecting Backdoors", Proc. of the 9th USENIX Security Symposium, August 2000.]]

Cited By

View all
  • (2023)Android Malware Detection Based on Static Analysis and Data Mining Techniques: A Systematic Literature ReviewBroadband Communications, Networks, and Systems10.1007/978-3-031-40467-2_4(51-71)Online publication date: 30-Jul-2023
  • (2022)A Survey of Host-Based Advanced Persistent Threat Detection TechnologyComputer Science and Application10.12677/CSA.2022.12102412:01(233-251)Online publication date: 2022
  • (2022)Convolutional Neural Network Structure to Detect and Localize CTC Using Image Processing2022 IEEE International IOT, Electronics and Mechatronics Conference (IEMTRONICS)10.1109/IEMTRONICS55184.2022.9795734(1-7)Online publication date: 1-Jun-2022
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
CCS '04: Proceedings of the 11th ACM conference on Computer and communications security
October 2004
376 pages
ISBN:1581139616
DOI:10.1145/1030083
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 25 October 2004

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. HTTP
  2. anomaly detection
  3. covert channels
  4. intrusion detection
  5. spyware detection
  6. tunnels

Qualifiers

  • Article

Conference

CCS04
Sponsor:

Acceptance Rates

Overall Acceptance Rate 1,261 of 6,999 submissions, 18%

Upcoming Conference

CCS '25

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)20
  • Downloads (Last 6 weeks)4
Reflects downloads up to 14 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2023)Android Malware Detection Based on Static Analysis and Data Mining Techniques: A Systematic Literature ReviewBroadband Communications, Networks, and Systems10.1007/978-3-031-40467-2_4(51-71)Online publication date: 30-Jul-2023
  • (2022)A Survey of Host-Based Advanced Persistent Threat Detection TechnologyComputer Science and Application10.12677/CSA.2022.12102412:01(233-251)Online publication date: 2022
  • (2022)Convolutional Neural Network Structure to Detect and Localize CTC Using Image Processing2022 IEEE International IOT, Electronics and Mechatronics Conference (IEMTRONICS)10.1109/IEMTRONICS55184.2022.9795734(1-7)Online publication date: 1-Jun-2022
  • (2022)Covert Timing Channels Detection Based on Image Processing Using Deep LearningAdvanced Information Networking and Applications10.1007/978-3-030-99619-2_51(546-555)Online publication date: 31-Mar-2022
  • (2021)An Exploit Kits Detection Approach Based on HTTP Message GraphIEEE Transactions on Information Forensics and Security10.1109/TIFS.2021.308008216(3387-3400)Online publication date: 2021
  • (2021)SnapCatch: Automatic Detection of Covert Timing Channels Using Image Processing and Machine LearningIEEE Access10.1109/ACCESS.2020.30462349(177-191)Online publication date: 2021
  • (2021)Decision Theory for Network Security: Active Sensing for Detection and Prevention of Data ExfiltrationApplied Risk Analysis for Guiding Homeland Security Policy10.1002/9781119287490.ch9(221-251)Online publication date: 28-Jan-2021
  • (2020)HeadPrintProceedings of the 35th Annual ACM Symposium on Applied Computing10.1145/3341105.3373862(1696-1705)Online publication date: 30-Mar-2020
  • (2020)Critical Review on Privacy and Security Issues in Data MiningEmerging Research in Data Engineering Systems and Computer Communications10.1007/978-981-15-0135-7_21(217-230)Online publication date: 11-Feb-2020
  • (2019)Counterfeit Fingerprint Detection of Outbound HTTP Traffic with Recurrent Neural Network2019 21st International Conference on Advanced Communication Technology (ICACT)10.23919/ICACT.2019.8701951(533-538)Online publication date: Feb-2019
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media