skip to main content
10.1145/3628797.3628874acmotherconferencesArticle/Chapter ViewAbstractPublication PagessoictConference Proceedingsconference-collections
research-article

A Machine Learning-Based Framework for Detecting Malicious HTTPS Traffic

Published: 07 December 2023 Publication History

Abstract

Malicious traffic detection plays an essential role for Network Operators to prevent attackers from manipulating the network systems. In the past, many Network Intrusion Detection Systems (e.g., Snort, etc.) were designed to inspect the packets using pre-defined rules in order to identify the malicious traffic. Despite achieving good performance in the context of non-encrypted traffic, these systems are ineffective nowadays due to encrypted traffic (e.g., HTTPS, QUIC, etc.) and complex network behaviors of compromised computers. Therefore, many studies focus on malicious traffic detection mechanisms using Machine Learning (ML), which analyzes flow-based features using ML algorithms to detect the traffic generated by malware. There are two main kinds of features for malicious traffic detection containing protocol-agnostic features and TLS/SSL features. Using all these features can result in high time complexity and performance degradation, so it cannot meet the real-time requirement of the Intrusion Detection Systems. Therefore, in this paper, we take into account different kinds of flow-based features and implement a feature selection to select an appropriate feature set to improve the detection accuracy and execution time for malicious traffic detection. Besides, the proposed framework is evaluated using various datasets: CTU-13, MCFP, and CIC-AndMal201. The experimental results show that the framework can achieve an accuracy of 99 percent in considered scenarios.

References

[1]
Blake Anderson and David McGrew. 2016. Identifying Encrypted Malware Traffic with Contextual Flow Data. In Proceedings of the 2016 ACM Workshop on Artificial Intelligence and Security (Vienna, Austria) (AISec ’16). Association for Computing Machinery, New York, NY, USA, 35–46. https://doi.org/10.1145/2996758.2996768
[2]
Blake Anderson and David McGrew. 2017. Machine Learning for Encrypted Malware Traffic Classification: Accounting for Noisy Labels and Non-Stationarity. In Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (Halifax, NS, Canada) (KDD ’17). Association for Computing Machinery, New York, NY, USA, 1723–1732. https://doi.org/10.1145/3097983.3098163
[3]
Blake Anderson, Subharthi Paul, and David McGrew. 2018. Deciphering malware’s use of TLS (without decryption). Journal of Computer Virology and Hacking Techniques 14 (2018), 195–211. https://doi.org/10.1007/s11416-017-0306-6
[4]
Czech Republic CTU University. 2018. MCFP dataset. https://www.stratosphereips.org/datasets-malware
[5]
Zhuoqun Fu, Mingxuan Liu, Yue Qin, Jia Zhang, Yuan Zou, Qilei Yin, Qi Li, and Haixin Duan. 2022. Encrypted Malware Traffic Detection via Graph-Based Network Analysis. In Proceedings of the 25th International Symposium on Research in Attacks, Intrusions and Defenses (Limassol, Cyprus) (RAID ’22). Association for Computing Machinery, New York, NY, USA, 495–509. https://doi.org/10.1145/3545948.3545983
[6]
S. García, M. Grill, J. Stiborek, and A. Zunino. 2014. An empirical comparison of botnet detection methods. Computers and Security 45 (2014), 100–123. https://doi.org/10.1016/j.cose.2014.05.011
[7]
Arash Habibi Lashkari, Andi Fitriah A. Kadir, Laya Taheri, and Ali A. Ghorbani. 2018. Toward Developing a Systematic Approach to Generate Benchmark Android Malware Datasets and Classification. In 2018 International Carnahan Conference on Security Technology (ICCST). 1–7. https://doi.org/10.1109/CCST.2018.8585560
[8]
Chencheng Ma, Yanhua Du, and Lifeng Cao. 2020. Improved KNN Algorithm for Fine-Grained Classification of Encrypted Network Flow. Electronics 9, 2 (Feb. 2020). https://doi.org/10.3390/electronics9020324
[9]
Masataka Nakahara., Norihiro Okui., Yasuaki Kobayashi., and Yutaka Miyake.2020. Machine Learning based Malware Traffic Detection on IoT Devices using Summarized Packet Data. In Proceedings of the 5th International Conference on Internet of Things, Big Data and Security - IoTBDS. INSTICC, SciTePress, 78–87. https://doi.org/10.5220/0009345300780087
[10]
Debmalya Sarkar, P. Vinod, and Suleiman Y. Yerima. 2020. Detection of Tor Traffic using Deep Learning. In 2020 IEEE/ACS 17th International Conference on Computer Systems and Applications (AICCSA). https://doi.org/10.1109/AICCSA50499.2020.9316533
[11]
Anish Singh Shekhawat, Fabio Di Troia, and Mark Stamp. 2019. Feature analysis of encrypted malicious traffic. Expert Systems with Applications 125 (2019), 130–141. https://doi.org/10.1016/j.eswa.2019.01.064
[12]
George Stergiopoulos, Alexander Talavari, Evangelos Bitsikas, and Dimitris Gritzalis. 2018. Automatic Detection of Various Malicious Traffic Using Side Channel Features on TCP Packets. In Computer Security: 23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part I (Barcelona, Spain). Springer-Verlag, Berlin, Heidelberg, 346–362. https://doi.org/10.1007/978-3-319-99073-6_17

Cited By

View all
  • (2024)Malicious Traffic Detection in Multi-Environment Network Using Dual-Data Trained LightGBM Approach2024 IEEE 21st International Conference on Mobile Ad-Hoc and Smart Systems (MASS)10.1109/MASS62177.2024.00095(598-603)Online publication date: 23-Sep-2024

Index Terms

  1. A Machine Learning-Based Framework for Detecting Malicious HTTPS Traffic

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    SOICT '23: Proceedings of the 12th International Symposium on Information and Communication Technology
    December 2023
    1058 pages
    ISBN:9798400708916
    DOI:10.1145/3628797
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 07 December 2023

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Encrypted Traffic
    2. HTTPS
    3. Instrusion Detection System
    4. Machine Learning
    5. Malware Detection

    Qualifiers

    • Research-article
    • Research
    • Refereed limited

    Conference

    SOICT 2023

    Acceptance Rates

    Overall Acceptance Rate 147 of 318 submissions, 46%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)87
    • Downloads (Last 6 weeks)10
    Reflects downloads up to 01 Mar 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Malicious Traffic Detection in Multi-Environment Network Using Dual-Data Trained LightGBM Approach2024 IEEE 21st International Conference on Mobile Ad-Hoc and Smart Systems (MASS)10.1109/MASS62177.2024.00095(598-603)Online publication date: 23-Sep-2024

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format.

    HTML Format

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media