Hammer: A real-world end-to-end network traffic simulator

Author(s):  
Ioannis Prevezanos ◽  
Andreas Angelou ◽  
Christos Tselios ◽  
Alexandros Stergiakis ◽  
Vassilis Tsogkas ◽  
...  
Entropy ◽  
2021 ◽  
Vol 23 (5) ◽  
pp. 507
Author(s):  
Piotr Białczak ◽  
Wojciech Mazurczyk

Malicious software utilizes HTTP protocol for communication purposes, creating network traffic that is hard to identify as it blends into the traffic generated by benign applications. To this aim, fingerprinting tools have been developed to help track and identify such traffic by providing a short representation of malicious HTTP requests. However, currently existing tools do not analyze all information included in the HTTP message or analyze it insufficiently. To address these issues, we propose Hfinger, a novel malware HTTP request fingerprinting tool. It extracts information from the parts of the request such as URI, protocol information, headers, and payload, providing a concise request representation that preserves the extracted information in a form interpretable by a human analyst. For the developed solution, we have performed an extensive experimental evaluation using real-world data sets and we also compared Hfinger with the most related and popular existing tools such as FATT, Mercury, and p0f. The conducted effectiveness analysis reveals that on average only 1.85% of requests fingerprinted by Hfinger collide between malware families, what is 8–34 times lower than existing tools. Moreover, unlike these tools, in default mode, Hfinger does not introduce collisions between malware and benign applications and achieves it by increasing the number of fingerprints by at most 3 times. As a result, Hfinger can effectively track and hunt malware by providing more unique fingerprints than other standard tools.


2021 ◽  
Author(s):  
Shiwei Wang ◽  
Haizhou Du ◽  
Lin Liu ◽  
Zhenyu Lin

Author(s):  
Ibibia K. Dabipi ◽  
Judy A. Perkins ◽  
Tierney Moore

Over the years the supply chain industry has been transforming to improve the end-to-end (production to delivery) process. Supply chain management (SCM) allows various industries to oversee and better handle how their product is manufactured and delivered. It allows them to track and identify the location of the product and to be more efficient in delivery. Integrating total asset visibility (TAV) technology into the supply chain structure can provide excellent visibility of a product. This kind of visibility complemented with various packaging schemes can assist in accommodating optimization strategies for visualizing the movement of a product throughout the entire supply chain pipeline. The chapter will define SCM, discuss TAV, review how transportation as well as optimization impacts SCM and TAV, and examine the role of packaging in the context of SCM and TAV.


2014 ◽  
Vol 43 (7) ◽  
pp. 706023 ◽  
Author(s):  
蒋定德 JIANG Dingde ◽  
赵祖耀 ZHAO Zuyao ◽  
许宏伟 XU Hongwei ◽  
王兴伟 WANG Xingwei

2021 ◽  
Vol 8 (2) ◽  
pp. 273-287
Author(s):  
Xuewei Bian ◽  
Chaoqun Wang ◽  
Weize Quan ◽  
Juntao Ye ◽  
Xiaopeng Zhang ◽  
...  

AbstractRecent learning-based approaches show promising performance improvement for the scene text removal task but usually leave several remnants of text and provide visually unpleasant results. In this work, a novel end-to-end framework is proposed based on accurate text stroke detection. Specifically, the text removal problem is decoupled into text stroke detection and stroke removal; we design separate networks to solve these two subproblems, the latter being a generative network. These two networks are combined as a processing unit, which is cascaded to obtain our final model for text removal. Experimental results demonstrate that the proposed method substantially outperforms the state-of-the-art for locating and erasing scene text. A new large-scale real-world dataset with 12,120 images has been constructed and is being made available to facilitate research, as current publicly available datasets are mainly synthetic so cannot properly measure the performance of different methods.


2021 ◽  
Vol 11 (17) ◽  
pp. 7789
Author(s):  
Asmara Afzal ◽  
Mehdi Hussain ◽  
Shahzad Saleem ◽  
M. Khuram Shahzad ◽  
Anthony T. S. Ho ◽  
...  

Instant messaging applications (apps) have played a vital role in online interaction, especially under COVID-19 lockdown protocols. Apps with security provisions are able to provide confidentiality through end-to-end encryption. Ill-intentioned individuals and groups use these security services to their advantage by using the apps for criminal, illicit, or fraudulent activities. During an investigation, the provision of end-to-end encryption in apps increases the complexity for digital forensics investigators. This study aims to provide a network forensic strategy to identify the potential artifacts from the encrypted network traffic of the prominent social messenger app Signal (on Android version 9). The analysis of the installed app was conducted over fully encrypted network traffic. By adopting the proposed strategy, the forensic investigator can easily detect encrypted traffic activities such as chatting, media messages, audio, and video calls by looking at the payload patterns. Furthermore, a detailed analysis of the trace files can help to create a list of chat servers and IP addresses of involved parties in the events. As a result, the proposed strategy significantly facilitates extraction of the app’s behavior from encrypted network traffic which can then be used as supportive evidence for forensic investigation.


2020 ◽  
Vol 17 (4A) ◽  
pp. 607-614
Author(s):  
Mohammad Abuthawabeh ◽  
Khaled Mahmoud

Signature-based malware detection algorithms are facing challenges to cope with the massive number of threats in the Android environment. In this paper, conversation-level network traffic features are extracted and used in a supervised-based model. This model was used to enhance the process of Android malware detection, categorization, and family classification. The model employs the ensemble learning technique in order to select the most useful features among the extracted features. A real-world dataset called CICAndMal2017 was used in this paper. The results show that Extra-trees classifier had achieved the highest weighted accuracy percentage among the other classifiers by 87.75%, 79.97%, and 66.71%for malware detection, malware categorization, and malware family classification respectively. A comparison with another study that uses the same dataset was made. This study has achieved a significant enhancement in malware family classification and malware categorization. For malware family classification, the enhancement was 39.71% for precision and 41.09% for recall. The rate of enhancement for the Android malware categorization was 30.2% and 31.14‬% for precision and recall, respectively


Sign in / Sign up

Export Citation Format

Share Document