About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
International Conference on Security and Privacy in Communication Networks. 10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part I

Research Article

Detecting Malicious Sessions Through Traffic Fingerprinting Using Hidden Markov Models

Download(Requires a free EAI acccount)
470 downloads
Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1007/978-3-319-23829-6_47,
        author={Sami Zhioua and Adnene Jabeur and Mahjoub Langar and Wael Ilahi},
        title={Detecting Malicious Sessions Through Traffic Fingerprinting Using Hidden Markov Models},
        proceedings={International Conference on Security and Privacy in Communication Networks. 10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part I},
        proceedings_a={SECURECOMM},
        year={2015},
        month={11},
        keywords={Malware detection Hidden Markov Model (HMM) Malicious sessions Traffic analysis},
        doi={10.1007/978-3-319-23829-6_47}
    }
    
  • Sami Zhioua
    Adnene Jabeur
    Mahjoub Langar
    Wael Ilahi
    Year: 2015
    Detecting Malicious Sessions Through Traffic Fingerprinting Using Hidden Markov Models
    SECURECOMM
    Springer
    DOI: 10.1007/978-3-319-23829-6_47
Sami Zhioua1,*, Adnene Jabeur2,*, Mahjoub Langar3,*, Wael Ilahi3,*
  • 1: King Fahd University of Petroleum and Minerals
  • 2: École Polytechnique
  • 3: École Nationale des Ingénieurs de Tunis
*Contact email: zhioua@kfupm.edu.sa, adnenebj@gmail.com, mahjoub.langar@enit.rnu.tn, waelilahi@gmail.com

Abstract

Almost any malware attack involves data communication between the infected host and the attacker host/server allowing the latter to remotely control the infected host. The remote control is achieved through opening different types of sessions such as remote desktop, webcam video streaming, file transfer, etc. In this paper, we present a traffic analysis based malware detection technique using Hidden Markov Model (HMM). The main contribution is that the proposed system does not only detect malware infections but also identifies with precision the type of malicious session opened by the attacker. The empirical analysis shows that the proposed detection system has a stable identification precision of 90 % and that it allows to identify between 40 % and 75 % of all malicious sessions in typical network traffic.

Keywords
Malware detection Hidden Markov Model (HMM) Malicious sessions Traffic analysis
Published
2015-11-23
Appears in
SpringerLink
http://dx.doi.org/10.1007/978-3-319-23829-6_47
Copyright © 2014–2025 ICST
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL