Title :
Two-phased method for detecting evasive network attack channels
Author :
Cao Zigang ; Xiong Gang ; Zhao Yong ; Guo Li ; Fang Binxing
Author_Institution :
Beijing Univ. of Posts & Telecommun., Beijing, China
Abstract :
With the rapid developments of information technology, various industries become much more dependent on networks. Driven by economic interests and the game between countries reflected by growing cyberspace confrontations, evasive network attacks on information infrastructures with high-tech, high concealment and long-term sustainability become severe threats to national security. In this paper, we propose a novel two-phased method for the detection of evasive network attacks which exploit or pretend to be common legal encryption services in order to escape security inspection. Malicious communications which camouflage themselves as legal encryption application are identified in the SSL1 session structure verification phase firstly, and then by server-side X.509 certificate based anomaly detection, suspicious attack behaviors are further distinguished effectively. Experiment results show that our method is very useful for detecting the network activities of certain unknown threats or new malwares. Besides, the proposed method can be applied to other similar services easily.
Keywords :
cryptography; information technology; invasive software; telecommunication channels; telecommunication security; SSL session structure verification phase; X.509 certificate based anomaly detection; encryption services; evasive network attacks; information infrastructures; information technology; legal encryption; malicious communications; malwares; national security; Cryptography; Firewalls (computing); Law; Ports (Computers); Protocols; Servers; SSL; X.509 certificate; anomaly detection; encryption; evasive network attacks;
Journal_Title :
Communications, China
DOI :
10.1109/CC.2014.6911087