Automated Generation of Models for Fast and Precise Detection of HTTP-Based Malware
Malicious software and especially botnets are among the most important security threats in the Internet. Thus, the accurate and timely detection of such threats is of great importance. Detecting machines infected with malware by identifying their malicious activities at the network level is an appealing approach, due to the ease of deployment. Nowadays, the most common communication channels used by attackers to control the infected machines are based on the HTTP protocol. To evade detection, HTTP-based malware adapt their behavior to the communication patterns of the benign HTTP clients, such as web browsers. This poses significant challenges to existing detection approaches like signature-based and behavioral-based detection systems. In this paper, we propose BotHound: a novel approach to precisely detect HTTP-based malware at the network level. The key idea is that implementations of the HTTP protocol by different entities have small but perceivable differences. Building on this observation, BotHound automatically generates models for malicious and benign requests and classifies at real time the HTTP traffic of a monitored network. Our evaluation results demonstrate that BotHound outperforms prior work on identifying HTTP-based botnets, being able to detect a large variety of real-world HTTP-based malware, including advanced persistent threats used in targeted
Automated Generation of Models for Fast and Precise Detection of HTTP-Based Malware
12th Annual Conference on Privacy, Security and Trust (PST)
Authors: | Apostolis Zarras, Antonis Papadogiannakis, Robert Gawlik, and Thorsten Holz |
Year/month: | 2014/7 |
Booktitle: | 12th Annual Conference on Privacy, Security and Trust (PST) |
Fulltext: | bothound.pdf |
Abstract |
|
Malicious software and especially botnets are among the most important security threats in the Internet. Thus, the accurate and timely detection of such threats is of great importance. Detecting machines infected with malware by identifying their malicious activities at the network level is an appealing approach, due to the ease of deployment. Nowadays, the most common communication channels used by attackers to control the infected machines are based on the HTTP protocol. To evade detection, HTTP-based malware adapt their behavior to the communication patterns of the benign HTTP clients, such as web browsers. This poses significant challenges to existing detection approaches like signature-based and behavioral-based detection systems. In this paper, we propose BotHound: a novel approach to precisely detect HTTP-based malware at the network level. The key idea is that implementations of the HTTP protocol by different entities have small but perceivable differences. Building on this observation, BotHound automatically generates models for malicious and benign requests and classifies at real time the HTTP traffic of a monitored network. Our evaluation results demonstrate that BotHound outperforms prior work on identifying HTTP-based botnets, being able to detect a large variety of real-world HTTP-based malware, including advanced persistent threats used in targeted |
Bibtex:
@inproceedings {author = { Apostolis Zarras and Antonis Papadogiannakis and Robert Gawlik and Thorsten Holz},
title = { Automated Generation of Models for Fast and Precise Detection of HTTP-Based Malware },
year = { 2014 },
month = { July },
booktitle = { 12th Annual Conference on Privacy, Security and Trust (PST) },
url = {https://www.sec.in.tum.de/i20/publications/automated-generation-of-models-for-fast-and-precise-detection-of-http-based-malware/@@download/file/bothound.pdf}
}