Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1109/EC2ND.2011.12guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Adaptive Detection of Covert Communication in HTTP Requests

Published: 06 September 2011 Publication History

Abstract

The infection of computer systems with malicious software is an enduring problem of computer security. Avoiding an infection in the first place is a hard task, as computer systems are often vulnerable to a multitude of attacks. However, to explore and control an infected system, an attacker needs to establish a communication channel with the victim. While such a channel can be easily established to an unprotected end host in the Internet, infiltrating a closed network usually requires passing an application-level gateway -- in most cases a web proxy -- which constitutes an ideal spot for detecting and blocking unusual outbound communication. This papers introduces DUMONT, a system for detecting covert outbound HTTP communication passing through a web proxy. DUMONT learns profiles of normal HTTP requests for each user of the proxy and adapts to individual web surfing characteristics. The profiles are inferred from a diverse set of features, covering the structure and content of outbound data, and allowing for automatically identifying tunnels and covert channels as deviations from normality. While this approach does not generally rule out sophisticated covert communication, it significantly improves on state-of-the-art methods and hardens networks against malware proliferation. This capability is demonstrated in an evaluation with 90 days of web traffic, where DUMONT uncovers the communication of malware, tunnels and backdoors with few false alarms.

Cited By

View all
  • (2019)Dynamic Malware Analysis in the Modern Era—A State of the Art SurveyACM Computing Surveys10.1145/332978652:5(1-48)Online publication date: 13-Sep-2019
  • (2017)DECANTeRProceedings of the 33rd Annual Computer Security Applications Conference10.1145/3134600.3134605(373-386)Online publication date: 4-Dec-2017
  1. Adaptive Detection of Covert Communication in HTTP Requests

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image Guide Proceedings
    EC2ND '11: Proceedings of the 2011 Seventh European Conference on Computer Network Defense
    September 2011
    58 pages
    ISBN:9780769547626

    Publisher

    IEEE Computer Society

    United States

    Publication History

    Published: 06 September 2011

    Author Tags

    1. Anomaly Detection
    2. Covert Channels
    3. Machine Learning
    4. Malicious Software
    5. Network Security

    Qualifiers

    • Article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 16 Dec 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2019)Dynamic Malware Analysis in the Modern Era—A State of the Art SurveyACM Computing Surveys10.1145/332978652:5(1-48)Online publication date: 13-Sep-2019
    • (2017)DECANTeRProceedings of the 33rd Annual Computer Security Applications Conference10.1145/3134600.3134605(373-386)Online publication date: 4-Dec-2017

    View Options

    View options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media