[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Gomez et al., 2023 - Google Patents

Unsupervised detection and clustering of malicious tls flows

Gomez et al., 2023

View PDF @Full View
Document ID
933848513911258425
Author
Gomez G
Kotzias P
Dell’Amico M
Bilge L
Caballero J
Publication year
Publication venue
Security and Communication Networks

External Links

Snippet

Malware abuses TLS to encrypt its malicious traffic, preventing examination by content signatures and deep packet inspection. Network detection of malicious TLS flows is important, but it is a challenging problem. Prior works have proposed supervised machine …
Continue reading at onlinelibrary.wiley.com (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/563Static detection by source code analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security

Similar Documents

Publication Publication Date Title
Anderson et al. Deciphering malware’s use of TLS (without decryption)
US11323466B2 (en) Malicious HTTP cookies detection and clustering
Vekshin et al. Doh insight: Detecting dns over https by machine learning
Rafique et al. Firma: Malware clustering and network signature generation with mixed network behaviors
Husák et al. HTTPS traffic analysis and client identification using passive SSL/TLS fingerprinting
CA2966408C (en) A system and method for network intrusion detection of covert channels based on off-line network traffic
Gomez et al. Unsupervised detection and clustering of malicious tls flows
Roques et al. Detecting malware in TLS traffic
Matoušek et al. On reliability of JA3 hashes for fingerprinting mobile applications
Han et al. The role of cloud services in malicious software: Trends and insights
Yan et al. Graph mining for cybersecurity: A survey
Singh et al. A comparative review of malware analysis and detection in HTTPs traffic
Ife et al. Waves of malice: A longitudinal measurement of the malicious file delivery ecosystem on the web
Moure-Garrido et al. Detecting malicious use of DOH tunnels using statistical traffic analysis
Gou et al. Discovering abnormal behaviors via HTTP header fields measurement
Yaokai Effective phishing detection using machine learning approach
Jeng et al. MD‐MinerP: Interaction Profiling Bipartite Graph Mining for Malware‐Control Domain Detection
Mohammed Network-Based Detection and Prevention System Against DNS-Based Attacks
Hatada et al. Finding new varieties of malware with the classification of network behavior
Yang et al. A multi-level feature extraction technique to detect moble botnet
Shah Detection of malicious encrypted web traffic using machine learning
Shbair Service-Level Monitoring of HTTPS Traffic
Nadeem et al. MalPaCA: malware packet sequence clustering and analysis
Qi et al. BotTokenizer: exploring network tokens of HTTP-based botnet using malicious network traces
Heino et al. JAPPI: An unsupervised endpoint application identification methodology for improved Zero Trust models, risk score calculations and threat detection