DocumentCode :
3751099
Title :
Stealthy malware traffic - Not as innocent as it looks
Author :
Xingsi Zhong;Yu Fu;Lu Yu;Richard Brooks;G. Kumar Venayagamoorthy
Author_Institution :
Real-Time Power and Intelligent Systems Laboratory Holcombe Department of Electrical and Computer Engineering Clemson University, Clemson, SC, 29634, USA
fYear :
2015
Firstpage :
110
Lastpage :
116
Abstract :
Malware is constantly evolving. Although existing countermeasures have success in malware detection, corresponding counter-countermeasures are always emerging. In this study, a counter-countermeasure that avoids network-based detection approaches by camouflaging malicious traffic as an innocuous protocol is presented. The approach includes two steps: Traffic format transformation and side-channel massage (SCM). Formattransforming encryption (FTE) translates protocol syntax to mimic another innocuous protocol while SCM obscures traffic side-channels. The proposed approach is illustrated by transforming Zeus botnet (Zbot) Command and Control (C&C) traffic into smart grid Phasor Measurement Unit (PMU) data. The experimental results show that the transformed traffic is identified by Wireshark as synchrophasor protocol, and the transformed protocol fools current side-channel attacks. Moreover, it is shown that a real smart grid Phasor Data Concentrator (PDC) accepts the false PMU data.
Keywords :
"Protocols","Phasor measurement units","Malware","Servers","Timing","Hidden Markov models","Encryption"
Publisher :
ieee
Conference_Titel :
Malicious and Unwanted Software (MALWARE), 2015 10th International Conference on
Print_ISBN :
978-1-5090-0317-4
Type :
conf
DOI :
10.1109/MALWARE.2015.7413691
Filename :
7413691
Link To Document :
بازگشت