Highlights

Above

© ANDRZEJ WOJCICKI/SCIENCE PHOTO LIBRARY/Getty

Seeing the big picture

31 Oct 2017

A system that identifies malicious patterns in network traffic could help create a more secure internet

An A*STAR team have developed a system that looks for general patterns associated with suspicious activities in network traffic, in order to defend against a wide variety of threats.

An A*STAR team have developed a system that looks for general patterns associated with suspicious activities in network traffic, in order to defend against a wide variety of threats.

© ANDRZEJ WOJCICKI/SCIENCE PHOTO LIBRARY/Getty

The majority of cyber-security solutions that stand between us and increasingly sophisticated malware, target only specific attacks or subsets of attacks, meaning that users may have to buy and install many different products to protect themselves. Now, A*STAR researchers have developed a system that instead gathers evidence across a wide stream of internet traffic, and identifies links and correlations related to suspicious activity.

“Our aim is to develop a framework to gather as much evidence as possible from a set of traffic, and indicate malicious anomalies, regardless of the type of attacks,” says Vrizlynn Thing at the A*STAR Institute for Infocomm Research, who led the study. 

Thing and her team designed their new framework to look out for the fundamental characteristics of the malicious activities that stalk unsuspecting users through the evolving cyber landscape. Through this approach, the framework is robust against new threatening software and gathers only relevant evidence on the threats. For example, the system looks out for data flows that arrive at fixed time intervals, because attack bots are much less random than ordinary human-generated internet activities. The model also identifies sources that try to communicate with a large number of destinations in a short time, which is indicative of a botnet. 

“The main challenge was devising ways to build up a large set of possible patterns which could serve as potential evidence for detecting a wide variety of anomalies,” says Thing. “We capture the persistent characteristics of the malicious activities in transit, and represent them in observable sequential forms. This has allowed us to detect very fundamental patterns related to malicious traffic.” 

The team tested their new evidence-gathering system on recorded internet traffic, and found it could quickly identify many notorious botnets such as Andromeda, Zeus and Sality, with very few false positives. Given this success, Thing is hopeful that by improving their detection patterns, their system could defend networks against a much wider variety of attacks than has previously been possible.

“If we can detect malware infections by analyzing network traffic, we can prevent malware from further spreading,” she says. “We could also trigger the disconnection of infected hosts, thereby curbing the rampant growth of botnets.”

The A*STAR-affiliated researchers contributing to this research are from the Institute for Infocomm Research (I2R).

Want to stay up-to-date with A*STAR’s breakthroughs? Follow us on Twitter and LinkedIn!

References

Divakaran, D. M., Fok, K. W., Nevat, I. & Thing, V. L. L. Evidence gathering for network security and forensics. Digital Investigation 20, S56–S65 (2017). | Article

This article was made for A*STAR Research by Nature Research Custom Media, part of Springer Nature