Skip to main content
Top

2024 | OriginalPaper | Chapter

Cyber Attack Detection with Encrypted Network Connection Analysis

Authors : Serkan Gonen, Gokce Karacayilmaz, Harun Artuner, Mehmet Ali Bariskan, Ercan Nurcan Yilmaz

Published in: Advances in Intelligent Manufacturing and Service System Informatics

Publisher: Springer Nature Singapore

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The chapter delves into the JA3 fingerprinting method developed by Salesforce, highlighting its lightweight nature and high accuracy in detecting malicious samples. It discusses the method's ability to prevent DNS Over HTTPS (DoH) attacks and provides a detailed case study on detecting a Meterpreter session using the JA3 and JA3s fingerprinting techniques. The study underscores the method's effectiveness in identifying anomalous SSL/TLS connections and its potential in enhancing network security in static networks with IoT/IIoT devices. The chapter concludes by emphasizing the importance of such methods in the face of evolving cyber-attack techniques and the need for robust encryption analysis tools.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
4.
go back to reference Kane, W.A., Vlach, T., Luks, R.: Encrypted traffic analysis. flowmon, 2019D. In: Sarunyagate (ed.), Lasers. McGraw-Hill, New York (1996) Kane, W.A., Vlach, T., Luks, R.: Encrypted traffic analysis. flowmon, 2019D. In: Sarunyagate (ed.), Lasers. McGraw-Hill, New York (1996)
6.
go back to reference Telesoft. JA3 Fingerprinting: Encrypted Thread Detection. (2020) Telesoft. JA3 Fingerprinting: Encrypted Thread Detection. (2020)
7.
go back to reference Matoušek, P., Burgetová, I., Ryšavý, O., Victor, M.: On reliability of JA3 hashes for fingerprinting mobile applications. In: Goel, S., Gladyshev, P., Johnson, D., Pourzandi, M., Majumdar, S. (eds.) Digital Forensics and Cyber Crime: 11th EAI International Conference, ICDF2C 2020, Boston, MA, USA, 15–16 Oct 2020, Proceedings, pp. 1–22. Springer International Publishing, Cham (2021). https://doi.org/10.1007/978-3-030-68734-2_1CrossRef Matoušek, P., Burgetová, I., Ryšavý, O., Victor, M.: On reliability of JA3 hashes for fingerprinting mobile applications. In: Goel, S., Gladyshev, P., Johnson, D., Pourzandi, M., Majumdar, S. (eds.) Digital Forensics and Cyber Crime: 11th EAI International Conference, ICDF2C 2020, Boston, MA, USA, 15–16 Oct 2020, Proceedings, pp. 1–22. Springer International Publishing, Cham (2021). https://​doi.​org/​10.​1007/​978-3-030-68734-2_​1CrossRef
8.
go back to reference Hejcman, L.: Fingerprinting and Identification of TLS Connections. Hejcman, L.: Fingerprinting and Identification of TLS Connections.
9.
go back to reference Deri, L., Fusco, F.: Using deep packet inspection in CyberTraffic analysis. In: 2021 IEEE International Conference on Cyber Security and Resilience (CSR), pp. 89–94. IEEE (2021) Deri, L., Fusco, F.: Using deep packet inspection in CyberTraffic analysis. In: 2021 IEEE International Conference on Cyber Security and Resilience (CSR), pp. 89–94. IEEE (2021)
10.
12.
go back to reference Fu, Z., et al.: Encrypted malware traffic detection via graph-based network analysis. In: Proceedings of the 25th International Symposium on Research in Attacks, Intrusions and Defenses, pp. 495–509. Presented at the Limassol, Cyprus (2022). https://doi.org/10.1145/3545948.3545983 Fu, Z., et al.: Encrypted malware traffic detection via graph-based network analysis. In: Proceedings of the 25th International Symposium on Research in Attacks, Intrusions and Defenses, pp. 495–509. Presented at the Limassol, Cyprus (2022). https://​doi.​org/​10.​1145/​3545948.​3545983
Metadata
Title
Cyber Attack Detection with Encrypted Network Connection Analysis
Authors
Serkan Gonen
Gokce Karacayilmaz
Harun Artuner
Mehmet Ali Bariskan
Ercan Nurcan Yilmaz
Copyright Year
2024
Publisher
Springer Nature Singapore
DOI
https://doi.org/10.1007/978-981-99-6062-0_57

Premium Partners