DocumentCode :
3705224
Title :
Early detection of high entropy traffic
Author :
Han Zhang;Christos Papadopoulos
Author_Institution :
Department of Computer Science, Colorado State University, Fort Collins, USA 80521
fYear :
2015
Firstpage :
104
Lastpage :
112
Abstract :
High entropy (HE) traffic may result from encrypted traffic such as C&C botnet communication. Such traffic also tends to be opaque to an IDS. However, line speed entropy calculation is expensive, especially for long flows. In this paper we introduce methodology to classify flows as HE or low entropy (LE) by considering only the first M packets of the flow. We use our HE classifiers in two ways: (a) to improve the effectiveness of BotHunter, a bot detection tool when presented with encrypted bot traffic, and (b) as a filter to reduce the load on an IDS. We implement our filter as a Snort preprocessor. Our results show that integration with BotHunter improves detection drastically. When used as a filter, our classifiers reduce the amount of traffic delivered to IDS by more than 50%, while maintaining more than 99.9% of the original alerts. Other work needs to inspect at least 13 times more packets or it misses about 70 times of the alerts.
Keywords :
"Entropy","Encryption","Protocols","Payloads","Software algorithms"
Publisher :
ieee
Conference_Titel :
Communications and Network Security (CNS), 2015 IEEE Conference on
Type :
conf
DOI :
10.1109/CNS.2015.7346817
Filename :
7346817
Link To Document :
بازگشت