Title :
Stealthy malware traffic - Not as innocent as it looks
Author :
Xingsi Zhong;Yu Fu;Lu Yu;Richard Brooks;G. Kumar Venayagamoorthy
Author_Institution :
Real-Time Power and Intelligent Systems Laboratory Holcombe Department of Electrical and Computer Engineering Clemson University, Clemson, SC, 29634, USA
Abstract :
Malware is constantly evolving. Although existing countermeasures have success in malware detection, corresponding counter-countermeasures are always emerging. In this study, a counter-countermeasure that avoids network-based detection approaches by camouflaging malicious traffic as an innocuous protocol is presented. The approach includes two steps: Traffic format transformation and side-channel massage (SCM). Formattransforming encryption (FTE) translates protocol syntax to mimic another innocuous protocol while SCM obscures traffic side-channels. The proposed approach is illustrated by transforming Zeus botnet (Zbot) Command and Control (C&C) traffic into smart grid Phasor Measurement Unit (PMU) data. The experimental results show that the transformed traffic is identified by Wireshark as synchrophasor protocol, and the transformed protocol fools current side-channel attacks. Moreover, it is shown that a real smart grid Phasor Data Concentrator (PDC) accepts the false PMU data.
Keywords :
"Protocols","Phasor measurement units","Malware","Servers","Timing","Hidden Markov models","Encryption"
Conference_Titel :
Malicious and Unwanted Software (MALWARE), 2015 10th International Conference on
Print_ISBN :
978-1-5090-0317-4
DOI :
10.1109/MALWARE.2015.7413691