论文标题
基于流动的检测和基于代理的逃避加密恶意软件C2流量
Flow-based detection and proxy-based evasion of encrypted malware C2 traffic
论文作者
论文摘要
众所周知,最先进的深度学习技术容易受到逃避攻击的攻击,在这种攻击中,从恶性样本产生了对抗性样本并将其错误分类为良性。基于TCP/IP流量功能的检测加密的恶意软件命令和控制流量可以作为学习任务,因此很容易受到逃避攻击的影响。但是,与例如在图像处理中,可以将生成的对抗样品直接映射到图像中,从流量到实际的TCP/IP数据包需要制定数据包序列,而没有建立的工艺方法,并且对此类工艺允许的一组可修改功能的限制。在本文中,我们讨论了生成和制作的对抗样本之间差距的学习和逃避后果。我们用在公共C2流量数据集,白盒对抗性学习以及基于代理的方法来制作更长的流量的方法中训练的深神经网络检测器来体现。我们的结果表明1)使用在使用制作的对抗样品时,可以在检测器上使用探测器上产生的对抗样品获得的高弹性率显着降低; 2)通过模型硬化对对抗样品的鲁棒性根据制定方法和攻击所允许的相应可修改功能集有所不同; 3)用对抗样本逐步训练训练的模型可以产生一个水平的竞争环境,在给定的攻击和检测器中,没有探测器对所有攻击都最好,并且没有攻击是对所有探测器的最佳攻击。据我们所知,这是第一次在加密的C2恶意软件流量检测中分析了水平的竞争功能设置和迭代硬化。
State of the art deep learning techniques are known to be vulnerable to evasion attacks where an adversarial sample is generated from a malign sample and misclassified as benign. Detection of encrypted malware command and control traffic based on TCP/IP flow features can be framed as a learning task and is thus vulnerable to evasion attacks. However, unlike e.g. in image processing where generated adversarial samples can be directly mapped to images, going from flow features to actual TCP/IP packets requires crafting the sequence of packets, with no established approach for such crafting and a limitation on the set of modifiable features that such crafting allows. In this paper we discuss learning and evasion consequences of the gap between generated and crafted adversarial samples. We exemplify with a deep neural network detector trained on a public C2 traffic dataset, white-box adversarial learning, and a proxy-based approach for crafting longer flows. Our results show 1) the high evasion rate obtained by using generated adversarial samples on the detector can be significantly reduced when using crafted adversarial samples; 2) robustness against adversarial samples by model hardening varies according to the crafting approach and corresponding set of modifiable features that the attack allows for; 3) incrementally training hardened models with adversarial samples can produce a level playing field where no detector is best against all attacks and no attack is best against all detectors, in a given set of attacks and detectors. To the best of our knowledge this is the first time that level playing field feature set- and iteration-hardening are analyzed in encrypted C2 malware traffic detection.