Detect Malicious Attacks from Entire TCP Communication Process

Fang Peng,Liusheng Huang,Mengjie Zhang,Hongli Xu,Shaowei Wang
DOI: https://doi.org/10.1007/978-3-319-70139-4_88
2017-01-01
Abstract:Malicious attack identification plays an essential role in network security monitoring. Current popular technologies are mainly to select a closely related set of attributes from a packet header for fingerprinting malicious attacks. Those methods are not effective enough because malicious attacks can be disguised as normal applications and we cannot observe their characteristics from only the packer's header. In this paper, we will employ the attributes generated from the entire TCP communication process to identify malicious attacks. A challenging point of our method is how to choose the right attributes from up to 248 properties of TCP flows for fingerprinting low proportion of malicious attacks. A wide variety of real-world viruses are analyzed as the malicious samples, such as extortion virus WannaCry. The experiment results demonstrate that the proposed method can not only fingerprint the viruses but also can accurately identify the types of virus.
What problem does this paper attempt to address?