Skip to main content

2024 | OriginalPaper | Buchkapitel

Cyber Attack Detection with Encrypted Network Connection Analysis

verfasst von : Serkan Gonen, Gokce Karacayilmaz, Harun Artuner, Mehmet Ali Bariskan, Ercan Nurcan Yilmaz

Erschienen in: Advances in Intelligent Manufacturing and Service System Informatics

Verlag: Springer Nature Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The evolution of science and technology has led to increasingly complex cyber security threats, with advanced evasion techniques and encrypted communication channels making attacks harder to detect. While encryption has improved privacy and confidentiality for users, it has also provided a new avenue for attackers to exploit. Traditional intrusion detection systems, which transitioned from signature-based to behavior-based approaches, have struggled to keep up with these challenges. To address this issue, researchers have turned to continuous system monitoring and network traffic packet analysis. However, this method can be resource-intensive and time-consuming, particularly when analyzing encrypted packets. In this study, the JA3 fingerprint infrastructure was examined as a potential solution for quickly detecting attacks conducted over encrypted sessions while minimizing system downtime and damage. The results demonstrated that the JA3 infrastructure effectively detected attacks carried out via encrypted channels. Although Windows 10 and Kali 2020.4 operating systems were used as the victim and attacker systems respectively, the methodology can be applied to other operating systems and network hardware by following the outlined steps. This research is expected to make a significant contribution to the field of encryption-based attack prevention.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
4.
Zurück zum Zitat Kane, W.A., Vlach, T., Luks, R.: Encrypted traffic analysis. flowmon, 2019D. In: Sarunyagate (ed.), Lasers. McGraw-Hill, New York (1996) Kane, W.A., Vlach, T., Luks, R.: Encrypted traffic analysis. flowmon, 2019D. In: Sarunyagate (ed.), Lasers. McGraw-Hill, New York (1996)
6.
Zurück zum Zitat Telesoft. JA3 Fingerprinting: Encrypted Thread Detection. (2020) Telesoft. JA3 Fingerprinting: Encrypted Thread Detection. (2020)
7.
Zurück zum Zitat Matoušek, P., Burgetová, I., Ryšavý, O., Victor, M.: On reliability of JA3 hashes for fingerprinting mobile applications. In: Goel, S., Gladyshev, P., Johnson, D., Pourzandi, M., Majumdar, S. (eds.) Digital Forensics and Cyber Crime: 11th EAI International Conference, ICDF2C 2020, Boston, MA, USA, 15–16 Oct 2020, Proceedings, pp. 1–22. Springer International Publishing, Cham (2021). https://doi.org/10.1007/978-3-030-68734-2_1CrossRef Matoušek, P., Burgetová, I., Ryšavý, O., Victor, M.: On reliability of JA3 hashes for fingerprinting mobile applications. In: Goel, S., Gladyshev, P., Johnson, D., Pourzandi, M., Majumdar, S. (eds.) Digital Forensics and Cyber Crime: 11th EAI International Conference, ICDF2C 2020, Boston, MA, USA, 15–16 Oct 2020, Proceedings, pp. 1–22. Springer International Publishing, Cham (2021). https://​doi.​org/​10.​1007/​978-3-030-68734-2_​1CrossRef
8.
Zurück zum Zitat Hejcman, L.: Fingerprinting and Identification of TLS Connections. Hejcman, L.: Fingerprinting and Identification of TLS Connections.
9.
Zurück zum Zitat Deri, L., Fusco, F.: Using deep packet inspection in CyberTraffic analysis. In: 2021 IEEE International Conference on Cyber Security and Resilience (CSR), pp. 89–94. IEEE (2021) Deri, L., Fusco, F.: Using deep packet inspection in CyberTraffic analysis. In: 2021 IEEE International Conference on Cyber Security and Resilience (CSR), pp. 89–94. IEEE (2021)
10.
Zurück zum Zitat Choi, J.S.: DNS over HTTPS (DoH) (2021) Choi, J.S.: DNS over HTTPS (DoH) (2021)
12.
Zurück zum Zitat Fu, Z., et al.: Encrypted malware traffic detection via graph-based network analysis. In: Proceedings of the 25th International Symposium on Research in Attacks, Intrusions and Defenses, pp. 495–509. Presented at the Limassol, Cyprus (2022). https://doi.org/10.1145/3545948.3545983 Fu, Z., et al.: Encrypted malware traffic detection via graph-based network analysis. In: Proceedings of the 25th International Symposium on Research in Attacks, Intrusions and Defenses, pp. 495–509. Presented at the Limassol, Cyprus (2022). https://​doi.​org/​10.​1145/​3545948.​3545983
Metadaten
Titel
Cyber Attack Detection with Encrypted Network Connection Analysis
verfasst von
Serkan Gonen
Gokce Karacayilmaz
Harun Artuner
Mehmet Ali Bariskan
Ercan Nurcan Yilmaz
Copyright-Jahr
2024
Verlag
Springer Nature Singapore
DOI
https://doi.org/10.1007/978-981-99-6062-0_57

    Marktübersichten

    Die im Laufe eines Jahres in der „adhäsion“ veröffentlichten Marktübersichten helfen Anwendern verschiedenster Branchen, sich einen gezielten Überblick über Lieferantenangebote zu verschaffen.