Cargando…

Hfinger: Malware HTTP Request Fingerprinting

Malicious software utilizes HTTP protocol for communication purposes, creating network traffic that is hard to identify as it blends into the traffic generated by benign applications. To this aim, fingerprinting tools have been developed to help track and identify such traffic by providing a short r...

Descripción completa

Detalles Bibliográficos
Autores principales: Białczak, Piotr, Mazurczyk, Wojciech
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2021
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8145592/
https://www.ncbi.nlm.nih.gov/pubmed/33922568
http://dx.doi.org/10.3390/e23050507
_version_ 1783697210760757248
author Białczak, Piotr
Mazurczyk, Wojciech
author_facet Białczak, Piotr
Mazurczyk, Wojciech
author_sort Białczak, Piotr
collection PubMed
description Malicious software utilizes HTTP protocol for communication purposes, creating network traffic that is hard to identify as it blends into the traffic generated by benign applications. To this aim, fingerprinting tools have been developed to help track and identify such traffic by providing a short representation of malicious HTTP requests. However, currently existing tools do not analyze all information included in the HTTP message or analyze it insufficiently. To address these issues, we propose Hfinger, a novel malware HTTP request fingerprinting tool. It extracts information from the parts of the request such as URI, protocol information, headers, and payload, providing a concise request representation that preserves the extracted information in a form interpretable by a human analyst. For the developed solution, we have performed an extensive experimental evaluation using real-world data sets and we also compared Hfinger with the most related and popular existing tools such as FATT, Mercury, and p0f. The conducted effectiveness analysis reveals that on average only 1.85% of requests fingerprinted by Hfinger collide between malware families, what is 8–34 times lower than existing tools. Moreover, unlike these tools, in default mode, Hfinger does not introduce collisions between malware and benign applications and achieves it by increasing the number of fingerprints by at most 3 times. As a result, Hfinger can effectively track and hunt malware by providing more unique fingerprints than other standard tools.
format Online
Article
Text
id pubmed-8145592
institution National Center for Biotechnology Information
language English
publishDate 2021
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-81455922021-05-26 Hfinger: Malware HTTP Request Fingerprinting Białczak, Piotr Mazurczyk, Wojciech Entropy (Basel) Article Malicious software utilizes HTTP protocol for communication purposes, creating network traffic that is hard to identify as it blends into the traffic generated by benign applications. To this aim, fingerprinting tools have been developed to help track and identify such traffic by providing a short representation of malicious HTTP requests. However, currently existing tools do not analyze all information included in the HTTP message or analyze it insufficiently. To address these issues, we propose Hfinger, a novel malware HTTP request fingerprinting tool. It extracts information from the parts of the request such as URI, protocol information, headers, and payload, providing a concise request representation that preserves the extracted information in a form interpretable by a human analyst. For the developed solution, we have performed an extensive experimental evaluation using real-world data sets and we also compared Hfinger with the most related and popular existing tools such as FATT, Mercury, and p0f. The conducted effectiveness analysis reveals that on average only 1.85% of requests fingerprinted by Hfinger collide between malware families, what is 8–34 times lower than existing tools. Moreover, unlike these tools, in default mode, Hfinger does not introduce collisions between malware and benign applications and achieves it by increasing the number of fingerprints by at most 3 times. As a result, Hfinger can effectively track and hunt malware by providing more unique fingerprints than other standard tools. MDPI 2021-04-23 /pmc/articles/PMC8145592/ /pubmed/33922568 http://dx.doi.org/10.3390/e23050507 Text en © 2021 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Białczak, Piotr
Mazurczyk, Wojciech
Hfinger: Malware HTTP Request Fingerprinting
title Hfinger: Malware HTTP Request Fingerprinting
title_full Hfinger: Malware HTTP Request Fingerprinting
title_fullStr Hfinger: Malware HTTP Request Fingerprinting
title_full_unstemmed Hfinger: Malware HTTP Request Fingerprinting
title_short Hfinger: Malware HTTP Request Fingerprinting
title_sort hfinger: malware http request fingerprinting
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8145592/
https://www.ncbi.nlm.nih.gov/pubmed/33922568
http://dx.doi.org/10.3390/e23050507
work_keys_str_mv AT białczakpiotr hfingermalwarehttprequestfingerprinting
AT mazurczykwojciech hfingermalwarehttprequestfingerprinting