Back to Search
Start Over
An Exploit Traffic Detection Method Based on Reverse Shell.
- Source :
- Applied Sciences (2076-3417); Jun2023, Vol. 13 Issue 12, p7161, 19p
- Publication Year :
- 2023
-
Abstract
- As the most crucial link in the network kill chain, exploiting a vulnerability is viewed as one of the most popular attack vectors to get the control authority of the system, which is dangerous for legal users. Therefore, an effective exploit traffic detection method is urgent. However, current methods are almost based on pattern matching, invalid for encrypted traffic. To address this problem, we propose a reverse shell-based exploit traffic detection method, ETDetector. Our key insight is that the reverse shell attack often coexists with vulnerability exploitation as one of the most popular exploit behaviors. So, we first extract the fusion information feature from original features, such as the packet delay sequence, as input of a decision tree model to identify reverse shell traffic in the shellcode execution stage. Then, we trace suspicious traffic in the shellcode delivery stage by reconstructing the session relationship of the two stages above. Compared with Blatta, using a cyclic neural network to detect early exploit traffic, the detection rate of ETDetector is increased by 50% and valid for encrypted exploit traffic. In addition, we propose a traffic stratification method based on a bisecting K-means algorithm, which can intuitively show the traffic communication behavior and improve the interpretability of ETDetector. [ABSTRACT FROM AUTHOR]
- Subjects :
- TRAFFIC monitoring
K-means clustering
DECISION trees
VECTOR control
Subjects
Details
- Language :
- English
- ISSN :
- 20763417
- Volume :
- 13
- Issue :
- 12
- Database :
- Complementary Index
- Journal :
- Applied Sciences (2076-3417)
- Publication Type :
- Academic Journal
- Accession number :
- 164592581
- Full Text :
- https://doi.org/10.3390/app13127161