Remote access trojan traffic early detection method based on Markov matrices and deep learning

Ben Pi,Chun Guo,Yunhe Cui,Guowei Shen,Jialong Yang,Yuan Ping
DOI: https://doi.org/10.1016/j.cose.2023.103628
IF: 5.105
2023-12-02
Computers & Security
Abstract:Remote Access Trojan (RAT) allows the attacker to gain remote control of an infected system and steal data from it. Due to over-reliance on expert experience and statistical features, most feature-based RAT detection methods perform inefficiently and can only achieve high accuracy with network traffic collected over a long period of time. Byte-based RAT detection methods often use sequence truncation to process network traffic and meet the uniform-sized input requirements for convolutional neural networks (CNNs). However, the sequence truncation brings a negative impact on detection accuracy for some information loss. Towards effective and efficient RAT detection, we define the early stage from the damage degree caused on victim hosts and propose a new RAT traffic early detection method based on Markov matrices and deep learning (RATMD). In RATMD, the byte sequences of the TCP payloads collected in the early stage are represented by byte transition probability matrices in a fixed size of 256*256, and the matrices are used to construct a detection model by using a CNN architecture. Experiments are conducted on the network traffic of 58 benign applications and 61 RATs. Employing only the byte sequences derived from the TCP payloads of the TCP service packets in the traffic between establishing the first TCP connection by the application client and the third TCP service packet sent by the application server, RATMD achieves a detection accuracy of 95.5%.
computer science, information systems
What problem does this paper attempt to address?