TY - GEN
T1 - Behavior-Driven Encrypted Malware Detection with Robust Traffic Representation
AU - Yin, Peng
AU - Jia, Jizhe
AU - Wang, Jing
AU - Liu, Yukai
AU - Shen, Meng
AU - Zhu, Liehuang
N1 - Publisher Copyright:
© The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2025.
PY - 2025
Y1 - 2025
N2 - Nowadays, network traffic encryption techniques are widely adopted to protect data confidentiality and prevent privacy leakage during data transmission. However, malware often leverages traffic encryption techniques to conceal their malicious activities or camouflage their traffic as benign traffic. To cope with this problem, most existing encrypted malware traffic detection methods employ machine learning or deep learning models to learn distinct features between malware and benign traffic. Nevertheless, existing methods still encounter one challenge, i.e., robustness to an imbalanced dataset. In this paper, we propose BDMF, a behavior-driven malware fingerprinting method based on deep learning, to achieve encrypted malware traffic detection. We first design a novel traffic representation named Traffic Behavior Matrix (TBM), which can abstract traffic behavior patterns initiated by malware compared with benign traffic. Subsequently, we design an effective classifier based on Convolutional Neural Networks (CNNs), which extract distinctive, robust features to achieve effective malware traffic detection. The robust behavior-driven traffic representation enables the CNN-based model to achieve robustness to an imbalanced dataset. We conduct extensive experiments with a real-world dataset to evaluate the detection performance of BDMF. The experimental results demonstrate BDMF outperforms all baseline methods in different evaluation metrics. Specifically, when the proportion of benign and malware traffic samples reaches 25:1, BDMF achieves an F1 score of 88.28%, which is 19.01% higher than the SOTA method. Moreover, BDMF maintains at least 0.89 precision and 0.85 recall with a relatively low time overhead.
AB - Nowadays, network traffic encryption techniques are widely adopted to protect data confidentiality and prevent privacy leakage during data transmission. However, malware often leverages traffic encryption techniques to conceal their malicious activities or camouflage their traffic as benign traffic. To cope with this problem, most existing encrypted malware traffic detection methods employ machine learning or deep learning models to learn distinct features between malware and benign traffic. Nevertheless, existing methods still encounter one challenge, i.e., robustness to an imbalanced dataset. In this paper, we propose BDMF, a behavior-driven malware fingerprinting method based on deep learning, to achieve encrypted malware traffic detection. We first design a novel traffic representation named Traffic Behavior Matrix (TBM), which can abstract traffic behavior patterns initiated by malware compared with benign traffic. Subsequently, we design an effective classifier based on Convolutional Neural Networks (CNNs), which extract distinctive, robust features to achieve effective malware traffic detection. The robust behavior-driven traffic representation enables the CNN-based model to achieve robustness to an imbalanced dataset. We conduct extensive experiments with a real-world dataset to evaluate the detection performance of BDMF. The experimental results demonstrate BDMF outperforms all baseline methods in different evaluation metrics. Specifically, when the proportion of benign and malware traffic samples reaches 25:1, BDMF achieves an F1 score of 88.28%, which is 19.01% higher than the SOTA method. Moreover, BDMF maintains at least 0.89 precision and 0.85 recall with a relatively low time overhead.
KW - Encrypted traffic analysis
KW - Malware traffic detection
KW - Traffic fingerprinting
UR - http://www.scopus.com/inward/record.url?scp=85218953113&partnerID=8YFLogxK
U2 - 10.1007/978-981-96-1548-3_8
DO - 10.1007/978-981-96-1548-3_8
M3 - Conference contribution
AN - SCOPUS:85218953113
SN - 9789819615476
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 111
EP - 126
BT - Algorithms and Architectures for Parallel Processing - 24th International Conference, ICA3PP 2024, Proceedings
A2 - Zhu, Tianqing
A2 - Li, Jin
A2 - Castiglione, Aniello
PB - Springer Science and Business Media Deutschland GmbH
T2 - 24th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2024
Y2 - 29 October 2024 through 31 October 2024
ER -