Detecting malicious sessions through traffic fingerprinting using hidden markov models

Sami Zhioua*, Adnene Ben Jabeur, Mahjoub Langar, Wael Ilahi

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

2 Scopus citations

Abstract

Almost any malware attack involves data communication between the infected host and the attacker host/server allowing the latter to remotely control the infected host. The remote control is achieved through opening different types of sessions such as remote desktop, webcam video streaming, file transfer, etc. In this paper, we present a traffic analysis based malware detection technique using Hidden Markov Model (HMM). The main contribution is that the proposed system does not only detect malware infections but also identifies with precision the type of malicious session opened by the attacker. The empirical analysis shows that the proposed detection system has a stable identification precision of 90% and that it allows to identify between 40% and 75% of all malicious sessions in typical network traffic.

Original languageEnglish
Title of host publicationLecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST
PublisherSpringer Verlag
Pages623-631
Number of pages9
DOIs
StatePublished - 2015

Publication series

NameLecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST
Volume152
ISSN (Print)1867-8211

Bibliographical note

Publisher Copyright:
© Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2015.

Keywords

  • HiddenMarkovModel (HMM)
  • Malicious sessions
  • Malware detection
  • Traffic analysis

ASJC Scopus subject areas

  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'Detecting malicious sessions through traffic fingerprinting using hidden markov models'. Together they form a unique fingerprint.

Cite this