Abstract
Passive application fingerprinting is a technique to detect anomalous outgoing connections. By monitoring the network traffic, a security monitor passively learns the network characteristics of the applications installed on each machine, and uses them to detect the presence of new applications (e.g., malware infection).
In this work, we propose HeadPrint, a novel passive fingerprint-ing approach that relies only on two orthogonal network header characteristics to distinguish applications, namely the order of the headers and their associated values. Our approach automatically identifies the set of characterizing headers, without relying on a predetermined set of header features. We implement HeadPrint, evaluate it in a real-world environment and we compare it with the state-of-the-art solution for passive application fingerprinting. We demonstrate our approach to be, on average, 20% more accurate and 30% more resilient to application updates than the state-of-the-art. Finally, we evaluate our approach in the setting of anomaly detection, and we show that HeadPrint is capable of detecting the presence of malicious communication, while generating significantly fewer false alarms than existing solutions.
In this work, we propose HeadPrint, a novel passive fingerprint-ing approach that relies only on two orthogonal network header characteristics to distinguish applications, namely the order of the headers and their associated values. Our approach automatically identifies the set of characterizing headers, without relying on a predetermined set of header features. We implement HeadPrint, evaluate it in a real-world environment and we compare it with the state-of-the-art solution for passive application fingerprinting. We demonstrate our approach to be, on average, 20% more accurate and 30% more resilient to application updates than the state-of-the-art. Finally, we evaluate our approach in the setting of anomaly detection, and we show that HeadPrint is capable of detecting the presence of malicious communication, while generating significantly fewer false alarms than existing solutions.
Original language | English |
---|---|
Title of host publication | 35th Annual ACM Symposium on Applied Computing, SAC 2020 |
Publisher | Association for Computing Machinery |
Pages | 1696-1705 |
Number of pages | 10 |
ISBN (Electronic) | 978-1-4503-6866-7 |
DOIs | |
Publication status | Published - 30 Mar 2020 |
Event | 35th Annual ACM Symposium on Applied Computing, SAC 2020 - Brno, Czech Republic Duration: 30 Mar 2020 → 3 Apr 2020 Conference number: 35 https://www.sigapp.org/sac/sac2020/#notice |
Conference
Conference | 35th Annual ACM Symposium on Applied Computing, SAC 2020 |
---|---|
Abbreviated title | SAC 2020 |
Country/Territory | Czech Republic |
City | Brno |
Period | 30/03/20 → 3/04/20 |
Internet address |
Keywords
- Anomaly detection
- Application fingerprinting
- Network security
- Cybersecurity