Cargando…
Hfinger: Malware HTTP Request Fingerprinting
Malicious software utilizes HTTP protocol for communication purposes, creating network traffic that is hard to identify as it blends into the traffic generated by benign applications. To this aim, fingerprinting tools have been developed to help track and identify such traffic by providing a short r...
Autores principales: | , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2021
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8145592/ https://www.ncbi.nlm.nih.gov/pubmed/33922568 http://dx.doi.org/10.3390/e23050507 |
_version_ | 1783697210760757248 |
---|---|
author | Białczak, Piotr Mazurczyk, Wojciech |
author_facet | Białczak, Piotr Mazurczyk, Wojciech |
author_sort | Białczak, Piotr |
collection | PubMed |
description | Malicious software utilizes HTTP protocol for communication purposes, creating network traffic that is hard to identify as it blends into the traffic generated by benign applications. To this aim, fingerprinting tools have been developed to help track and identify such traffic by providing a short representation of malicious HTTP requests. However, currently existing tools do not analyze all information included in the HTTP message or analyze it insufficiently. To address these issues, we propose Hfinger, a novel malware HTTP request fingerprinting tool. It extracts information from the parts of the request such as URI, protocol information, headers, and payload, providing a concise request representation that preserves the extracted information in a form interpretable by a human analyst. For the developed solution, we have performed an extensive experimental evaluation using real-world data sets and we also compared Hfinger with the most related and popular existing tools such as FATT, Mercury, and p0f. The conducted effectiveness analysis reveals that on average only 1.85% of requests fingerprinted by Hfinger collide between malware families, what is 8–34 times lower than existing tools. Moreover, unlike these tools, in default mode, Hfinger does not introduce collisions between malware and benign applications and achieves it by increasing the number of fingerprints by at most 3 times. As a result, Hfinger can effectively track and hunt malware by providing more unique fingerprints than other standard tools. |
format | Online Article Text |
id | pubmed-8145592 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2021 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-81455922021-05-26 Hfinger: Malware HTTP Request Fingerprinting Białczak, Piotr Mazurczyk, Wojciech Entropy (Basel) Article Malicious software utilizes HTTP protocol for communication purposes, creating network traffic that is hard to identify as it blends into the traffic generated by benign applications. To this aim, fingerprinting tools have been developed to help track and identify such traffic by providing a short representation of malicious HTTP requests. However, currently existing tools do not analyze all information included in the HTTP message or analyze it insufficiently. To address these issues, we propose Hfinger, a novel malware HTTP request fingerprinting tool. It extracts information from the parts of the request such as URI, protocol information, headers, and payload, providing a concise request representation that preserves the extracted information in a form interpretable by a human analyst. For the developed solution, we have performed an extensive experimental evaluation using real-world data sets and we also compared Hfinger with the most related and popular existing tools such as FATT, Mercury, and p0f. The conducted effectiveness analysis reveals that on average only 1.85% of requests fingerprinted by Hfinger collide between malware families, what is 8–34 times lower than existing tools. Moreover, unlike these tools, in default mode, Hfinger does not introduce collisions between malware and benign applications and achieves it by increasing the number of fingerprints by at most 3 times. As a result, Hfinger can effectively track and hunt malware by providing more unique fingerprints than other standard tools. MDPI 2021-04-23 /pmc/articles/PMC8145592/ /pubmed/33922568 http://dx.doi.org/10.3390/e23050507 Text en © 2021 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Article Białczak, Piotr Mazurczyk, Wojciech Hfinger: Malware HTTP Request Fingerprinting |
title | Hfinger: Malware HTTP Request Fingerprinting |
title_full | Hfinger: Malware HTTP Request Fingerprinting |
title_fullStr | Hfinger: Malware HTTP Request Fingerprinting |
title_full_unstemmed | Hfinger: Malware HTTP Request Fingerprinting |
title_short | Hfinger: Malware HTTP Request Fingerprinting |
title_sort | hfinger: malware http request fingerprinting |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8145592/ https://www.ncbi.nlm.nih.gov/pubmed/33922568 http://dx.doi.org/10.3390/e23050507 |
work_keys_str_mv | AT białczakpiotr hfingermalwarehttprequestfingerprinting AT mazurczykwojciech hfingermalwarehttprequestfingerprinting |