Title :
Automatic NIDS Rule Generating System for Detecting HTTP-like Malware Communication
Author :
Chia-Nan Kao;Yung-Cheng Chang;Nen-Fu Huang;I-Ju Liao;Rong-Tai Liu;Hsien-Wei Hung;Che-Wei Lin
Author_Institution :
Inst. of Commun. Eng., Nat. Tsing Hua Univ., Hsinchu, Taiwan
Abstract :
HTTP is the main protocol of the Internet and many network applications rely on it. Malware also utilizes it as a covert channel through which to evade the firewall (FW) or network intrusion detection system (NIDS). We recognize a malware, which employs HTTP to communicate as the HTTP-like Botnet. Some parts of the network traffic of an HTTP-like Botnet are different from normal HTTP applications. Based on the differences between HTTP-like Botnet traffic and normal HTTP applications, we developed an Automatic NIDS Rule Generating System (ARGS). The ARGS is a proof of concept (POC), which generates the corresponding NIDS rules efficiently and precisely from the input malign traffic (MT). ARGS is an incremental method to generate and optimize the rules. It can generate rules quickly and precisely without first requiring the collection of many malware samples for clustering. For practical purposes, we adopt Snort as our IDS engine in ARGS. In our experiments, the time required by ARGS to process MTs and generate corresponding rules is significantly shorter than existing solution when the rule-optimization is not required. Besides, the generated rule set can detect more 30% malware traffic compared to SourceFire IDS full-set and thus can efficiently stop the spreading of malware in time.
Keywords :
"Malware","Protocols","Ports (Computers)","Support vector machines","Browsers","Pattern matching","Engines"
Conference_Titel :
Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), 2015 International Conference on
DOI :
10.1109/IIH-MSP.2015.10