scholarly journals Experimental Evaluation of Malware Family Classification Methods from Sequential Information of TLS-Encrypted Traffic

Electronics ◽  
2021 ◽  
Vol 10 (24) ◽  
pp. 3180
Author(s):  
Joonseo Ha ◽  
Heejun Roh

In parallel with the rapid adoption of transport layer security (TLS), malware has utilized the encrypted communication channel provided by TLS to hinder detection from network traffic. To this end, recent research efforts are directed toward malware detection and malware family classification for TLS-encrypted traffic. However, amongst their feature sets, the proposals to utilize the sequential information of each TLS session has not been properly evaluated, especially in the context of malware family classification. In this context, we propose a systematic framework to evaluate the state-of-the-art malware family classification methods for TLS-encrypted traffic in a controlled environment and discuss the advantages and limitations of the methods comprehensively. In particular, our experimental results for the 10 representations and classifier combinations show that the graph-based representation for the sequential information achieves better performance regardless of the evaluated classification algorithms. With our framework and findings, researchers can design better machine learning based classifiers.

2021 ◽  
Vol 11 (1) ◽  
pp. 59-68
Author(s):  
Hamza Touil ◽  
Nabil El Akkad ◽  
Khalid Satori

Much of the Internet's communication is encrypted, and its content is only accessible at two endpoints, a client and a server. However, any encryption requires a key that must be negotiated without being revealed to potential attackers. The so-called TLS (Transport Layer Security) handshake is often used for this task without obviating that many fundamental parameters of TLS connections are transmitted explicitly. Thus, third parties have access to metadata, including information about the endpoints, how the connection is used. On the other hand, QoS is considered the central part of the communication used to judge the deliverable quality through several parameters (latency, jitter ...). This document describes a secure approach and meets mainly the requirements of quality of service on a communication channel (free, loaded, congested ...), using the robustness and flexibility of the TLS protocol represented on the characteristics of existing encryption keys on its list of "ciphers suites." We focused more particularly on the AES key (Advanced Encryption Standard), including the different sizes (128,192,256), given its resistance to various classical attacks (differential, linear, ...) and its lightness compared to other protocols such as DES, 3DES ... This method is useful in continuous communications in a time axis (video sequence, VOIP call...).


2020 ◽  
pp. 1-26
Author(s):  
Qinwen Hu ◽  
Muhammad Rizwan Asghar ◽  
Nevil Brownlee

HTTPS refers to an application-specific implementation that runs HyperText Transfer Protocol (HTTP) on top of Secure Socket Layer (SSL) or Transport Layer Security (TLS). HTTPS is used to provide encrypted communication and secure identification of web servers and clients, for different purposes such as online banking and e-commerce. However, many HTTPS vulnerabilities have been disclosed in recent years. Although many studies have pointed out that these vulnerabilities can lead to serious consequences, domain administrators seem to ignore them. In this study, we evaluate the HTTPS security level of Alexa’s top 1 million domains from two perspectives. First, we explore which popular sites are still affected by those well-known security issues. Our results show that less than 0.1% of HTTPS-enabled servers in the measured domains are still vulnerable to known attacks including Rivest Cipher 4 (RC4), Compression Ratio Info-Leak Mass Exploitation (CRIME), Padding Oracle On Downgraded Legacy Encryption (POODLE), Factoring RSA Export Keys (FREAK), Logjam, and Decrypting Rivest–Shamir–Adleman (RSA) using Obsolete and Weakened eNcryption (DROWN). Second, we assess the security level of the digital certificates used by each measured HTTPS domain. Our results highlight that less than 0.52% domains use the expired certificate, 0.42% HTTPS certificates contain different hostnames, and 2.59% HTTPS domains use a self-signed certificate. The domains we investigate in our study cover 5 regions (including ARIN, RIPE NCC, APNIC, LACNIC, and AFRINIC) and 61 different categories such as online shopping websites, banking websites, educational websites, and government websites. Although our results show that the problem still exists, we find that changes have been taking place when HTTPS vulnerabilities were discovered. Through this three-year study, we found that more attention has been paid to the use and configuration of HTTPS. For example, more and more domains begin to enable the HTTPS protocol to ensure a secure communication channel between users and websites. From the first measurement, we observed that many domains are still using TLS 1.0 and 1.1, SSL 2.0, and SSL 3.0 protocols to support user clients that use outdated systems. As the previous studies revealed security risks of using these protocols, in the subsequent studies, we found that the majority of domains updated their TLS protocol on time. Our 2020 results suggest that most HTTPS domains use the TLS 1.2 protocol and show that some HTTPS domains are still vulnerable to the existing known attacks. As academics and industry professionals continue to disclose attacks against HTTPS and recommend the secure configuration of HTTPS, we found that the number of vulnerable domain is gradually decreasing every year.


2021 ◽  
Author(s):  
Ronaldo Serrano ◽  
Ckristian Duran ◽  
Trong-Thuc Hoang ◽  
Marco Sarmiento ◽  
Akira Tsukamoto ◽  
...  

JoTI ◽  
2020 ◽  
Vol 2 (2) ◽  
pp. 12-23
Author(s):  
Dian Rachmadini ◽  
Ira Puspasari ◽  
Jusak

Protokol MQTT merupakan salah satu protokol IoT dengan konsep publisher, subscriber, dan broker. Penerapan protokol MQTT dengan fitur keamanan dapat menggunakan Transport Layer Security (TLS). Pada makalah ini, fitur keamanan TLS pada MQTT akan diimplementasikan untuk mengirim data sinyal EKG. Sinyal EKG berbeda setiap orang dan merupakan privasi bagi pasien, karena dari sinyal EKG ini juga dapat digunakan untuk melihat penyakit pasien tersebut. Proses transmisi pada MQTT Security (MQTTS) akan menggunakan file kunci yang telah dibuat oleh broker. File kunci ini akan diberikan kepada client supaya bisa melakukan komunikasi, mengirim dan menerima data yang telah terenkripsi. Enkripsi data dilakukan karena adanya file kunci ini sehingga proses transmisi lebih aman. Hasil analisis perhitungan selisih besar paket sebelum dan setelah pengiriman pada QoS 0 adalah 152,6458 byte dan 139,4504 byte. Sedangkan QoS 1 sebesar 99,7932 byte dan 115,5321 byte. Kedua QoS menunjukkan selisih yang cukup besar, tetapi disisi lain pegiriman data menjadi lebih aman. Pada pengujian waktu yang diperlukan untuk proses enkripsi, QoS 0 menghasilkan waktu rata-rata 0,7 ms, QoS 1 menunjukkan hasil lebih lama yaitu 9,6 ms   dikarenakan penambahan sinyal kontrol pada QoS 1. Hasil uji integritas data dengan cross-correlation , QoS 0 dan QoS 1 menunjukkan nilai 1 pada lag ke-0 yang artinya data yang dikirim dan diterima tidak terdapat perubahan (sama).


Sign in / Sign up

Export Citation Format

Share Document