skip to main content
research-article

HeadPrint: detecting anomalous communications through header-based application fingerprinting

Published: 30 March 2020 Publication History

Abstract

Passive application fingerprinting is a technique to detect anomalous outgoing connections. By monitoring the network traffic, a security monitor passively learns the network characteristics of the applications installed on each machine, and uses them to detect the presence of new applications (e.g., malware infection).
In this work, we propose HeadPrint, a novel passive fingerprinting approach that relies only on two orthogonal network header characteristics to distinguish applications, namely the order of the headers and their associated values. Our approach automatically identifies the set of characterizing headers, without relying on a predetermined set of header features. We implement HeadPrint, evaluate it in a real-world environment and we compare it with the state-of-the-art solution for passive application fingerprinting. We demonstrate our approach to be, on average, 20% more accurate and 30% more resilient to application updates than the state-of-the-art. Finally, we evaluate our approach in the setting of anomaly detection, and we show that HeadPrint is capable of detecting the presence of malicious communication, while generating significantly fewer false alarms than existing solutions.

References

[1]
Daniel Bakkelund. 2009. An LCS-based string metric. Olso, Norway: University of Oslo (2009).
[2]
Károly Boda, Ádám Máté Földes, Gábor György Gulyás, and Sándor Imre. 2011. User tracking on the web via cross-browser fingerprinting. In Nordic Conference on Secure IT Systems. Springer, 31--46.
[3]
Kevin Borders and Atul Prakash. 2004. Web tap: detecting covert web traffic. In Proc. of the conference on Computer and Communications Security.
[4]
Shyam Boriah, Varun Chandola, and Vipin Kumar. 2008. Similarity Measures for Categorical Data: A Comparative Evaluation. In Proc. of the International Conference on Data Mining.
[5]
Riccardo Bortolameotti, Thijs van Ede, Marco Caselli, Maarten H Everts, Pieter Hartel, Rick Hofstede, Willem Jonker, and Andreas Peter. 2017. DECANTeR: DEteCtion of Anomalous outbouNd HTTP TRaffic by Passive Application Fingerprinting. In Proc. of the ACM Annual Computer Security Applications Conference.
[6]
Riccardo Bortolameotti, Thijs van Ede, Andrea Continella, Maarten Everts, Willem Jonker, Pieter Hartel, and Andreas Peter. 2019. Victim-Aware Adaptive Covert Channels. In Proc. of the Conference on Security and Privacy in Communication Networks (SecureComm). Orlando, FL.
[7]
Yinzhi Cao, Song Li, and Erik Wijmans. 2017. (Cross-) Browser Fingerprinting via OS and Hardware Level Features. In Annual Network and Distributed System Security Symposium (NDSS).
[8]
Andrea Continella, Yanick Fratantonio, Martina Lindorfer, Alessandro Puccetti, Ali Zand, Christopher Kruegel, and Giovanni Vigna. 2017. Obfuscation-Resilient Privacy Leak Detection for Mobile Apps Through Differential Analysis. In Proc. of the Network and Distributed System Security Symposium (NDSS).
[9]
Manuel Crotti, Maurizio Dusi, Francesco Gringoli, and Luca Salgarelli. 2007. Traffic classification through simple statistical fingerprinting. Computer Communication Review 37, 1 (2007), 5--16.
[10]
Shuaifu Dai, Alok Tongaonkar, Xiaoyin Wang, Antonio Nucci, and Dawn Song. 2013. Networkprofiler: Towards automatic fingerprinting of android apps. In Proc. of the IEEE INFOCOM Conference.
[11]
Zakir Durumeric, Zane Ma, Drew Springall, Richard Barnes, Nick Sullivan, Elie Bursztein, Michael Bailey, J. Alex Halderman, and Vem Paxson. 2017. The Security Impact of HTTPS Interception. In Proc. of the Annual Network and Distributed System Security Symposium (NDSS).
[12]
Peter Eckersley. 2010. How unique is your web browser?. In International Symposium on Privacy Enhancing Technologies Symposium. Springer, 1--18.
[13]
Electronic Frontier Foundation. [n. d.]. Kaspersky User-Agent Strings - NSA. ([n. d.]). https://www.eff.org/it/node/86529
[14]
Steven Englehardt and Arvind Narayanan. 2016. Online Tracking: A 1-million-site Measurement and Analysis. In Proc. of the ACM SIGSAC Conference on Computer and Communications Security, Vienna, Austria, October 24--28, 2016. 1388--1401.
[15]
David Fifield and Serge Egelman. 2015. Fingerprinting Web Users Through Font Metrics. In Proc. of the Financial Cryptography and Data Security International Conference (FC).
[16]
Martin Roesch. [n. d.]. Cisco Announces OpenAppID, the Next Open Source Game Changer in Cybersecurity. ([n. d.]). https://blogs.cisco.com/security/cisco-announces-openappid-the-next-open-source-game-changer-in-cybersecurity
[17]
Martin Roesch. [n. d.]. Firepower Management Center Configuration Guide. ([n. d.]). https://www.cisco.com/c/en/us/td/docs/security/firepower/610/configuration/guide/fpmc-config-guide-v61/application_detection.html?bookSearch=true
[18]
Stanislav Miskovic, Gene Moo Lee, Yong Liao, and Mario Baldi. 2015. AppPrint: automatic fingerprinting of mobile applications in network traffic. In International Conference on Passive and Active Network Measurement. Springer, 57--69.
[19]
MITRE. [n. d.]. Commonly Used Ports, MITRE. ([n. d.]). https://attack.mitre.org/techniques/T1043/
[20]
Jose Nazario and Thorsten Holz. 2008. As the net churns: Fast-flux botnet observations. In Malicious and Unwanted Software, 2008. MALWARE 2008. 3rd International Conference on. IEEE, 24--31.
[21]
Terry Nelms, Roberto Perdisci, and Mustaque Ahamad. 2013. ExecScent: Mining for New C&C Domains in Live Networks with Adaptive Control Protocol Templates. In Proc. of the USENIX Security Symposium.
[22]
Vern Paxson. 1999. Bro: a system for detecting network intruders in real-time. Computer networks 31, 23-24 (1999), 2435--2463.
[23]
F. Pedregosa, G. Varoquaux, A. Gramfort, V. Michel, B. Thirion, O. Grisel, M. Blondel, P. Prettenhofer, R. Weiss, V. Dubourg, J. Vanderplas, A. Passos, D. Cournapeau, M. Brucher, M. Perrot, and E. Duchesnay. 2011. Scikit-learn: Machine Learning in Python. Journal of Machine Learning Research 12 (2011), 2825--2830.
[24]
Roberto Perdisci, Wenke Lee, and Nick Feamster. 2010. Behavioral Clustering of HTTP-Based Malware and Signature Generation Using Malicious Network Traces. In Proc. of the USENIX Symposium on Networked Systems Design and Implementation, NSDI 2010, April 28--30, 2010, San Jose, CA, USA. 391--404.
[25]
Ponemon Institute. [n. d.]. 2018 Cost of a Data Breach Study by Ponemon. ([n. d.]). https://www.ibm.com/security/data-breach
[26]
M Zubair Rafique and Juan Caballero. 2013. Firma: Malware clustering and network signature generation with mixed network behaviors. In International Workshop on Recent Advances in Intrusion Detection. Springer, 144--163.
[27]
John W Ratcliff and David E Metzener. 1988. Pattern-matching-the gestalt approach. Dr Dobbs Journal 13, 7 (1988), 46.
[28]
Martin Roesch. 1999. Snort: Lightweight Intrusion Detection for Networks. In Proc. of the Conference on Systems Administration (LISA-99), Seattle, WA, USA, November 7--12, 1999. 229--238.
[29]
Guido Schwenk and Konrad Rieck. 2011. Adaptive detection of covert communication in http requests. In Computer Network Defense (EC2ND), 2011 Seventh European Conference on. IEEE, 25--32.
[30]
Robin Sommer and Vern Paxson. 2010. Outside the Closed World: On Using Machine Learning for Network Intrusion Detection. In Proc. fo the IEEE Symposium on Security and Privacy (S&P).
[31]
Aditya K. Sood, Sherali Zeadally, and Richard J. Enbody. 2016. An Empirical Study of HTTP-based Financial Botnets. IEEE Trans. Dependable Sec. Comput. 13, 2 (2016), 236--251.
[32]
Vincent F Taylor, Riccardo Spolaor, Mauro Conti, and Ivan Martinovic. 2016. Appscanner: Automatic fingerprinting of smartphone apps from encrypted network traffic. In Proc. of the IEEE European Symposium on Security and Privacy.
[33]
Antoine Vastel, Pierre Laperdrix, Walter Rudametkin, and Romain Rouvoy. 2018. FP-STALKER: Tracking Browser Fingerprint Evolutions. In IEEE S&P 2018-39th IEEE Symposium on Security and Privacy. IEEE, 1--14.
[34]
Qiang Xu, Yong Liao, Stanislav Miskovic, Z Morley Mao, Mario Baldi, Antonio Nucci, and Thomas Andrews. 2015. Automatic generation of mobile app signatures from traffic observations. In Proc. of the IEEE INFOCOM Conference.
[35]
Hongyi Yao, Gyan Ranjan, Alok Tongaonkar, Yong Liao, and Zhuoqing Morley Mao. 2015. Samples: Self adaptive mining of persistent lexical snippets for classifying mobile application traffic. In Proc. of the Annual International Conference on Mobile Computing and Networking. ACM, 439--451.
[36]
Ali Zand, Giovanni Vigna, Xifeng Yan, and Christopher Kruegel. 2014. Extracting probable command and control signatures for detecting botnets. In Symposium on Applied Computing, SAC.
[37]
Sebastian Zander, Grenville J. Armitage, and Philip Branch. 2007. A survey of covert channels and countermeasures in computer network protocols. IEEE Communications Surveys and Tutorials 9, 1-4 (2007), 44--57.
[38]
Apostolis Zarras, Antonis Papadogiannakis, Robert Gawlik, and Thorsten Holz. 2014. Automated generation of models for fast and precise detection of HTTP-based malware. In Privacy, Security and Trust (PST), 2014 Twelfth Annual International Conference on. IEEE, 249--256.

Cited By

View all
  • (2023)Model Update for Intrusion Detection: Analyzing the Performance of Delayed Labeling and Active Learning StrategiesComputers & Security10.1016/j.cose.2023.103451(103451)Online publication date: Aug-2023
  • (2021)Hfinger: Malware HTTP Request FingerprintingEntropy10.3390/e2305050723:5(507)Online publication date: 23-Apr-2021
  • (2021)Intrusion Detection over Network Packets using Data Stream Classification Algorithms2021 IEEE 33rd International Conference on Tools with Artificial Intelligence (ICTAI)10.1109/ICTAI52525.2021.00157(985-990)Online publication date: Nov-2021

Index Terms

  1. HeadPrint: detecting anomalous communications through header-based application fingerprinting
    Index terms have been assigned to the content through auto-classification.

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    SAC '20: Proceedings of the 35th Annual ACM Symposium on Applied Computing
    March 2020
    2348 pages
    ISBN:9781450368667
    DOI:10.1145/3341105
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 30 March 2020

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. anomaly detection
    2. application fingerprinting
    3. network security

    Qualifiers

    • Research-article

    Conference

    SAC '20
    Sponsor:
    SAC '20: The 35th ACM/SIGAPP Symposium on Applied Computing
    March 30 - April 3, 2020
    Brno, Czech Republic

    Acceptance Rates

    Overall Acceptance Rate 1,650 of 6,669 submissions, 25%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)29
    • Downloads (Last 6 weeks)4
    Reflects downloads up to 24 Oct 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2023)Model Update for Intrusion Detection: Analyzing the Performance of Delayed Labeling and Active Learning StrategiesComputers & Security10.1016/j.cose.2023.103451(103451)Online publication date: Aug-2023
    • (2021)Hfinger: Malware HTTP Request FingerprintingEntropy10.3390/e2305050723:5(507)Online publication date: 23-Apr-2021
    • (2021)Intrusion Detection over Network Packets using Data Stream Classification Algorithms2021 IEEE 33rd International Conference on Tools with Artificial Intelligence (ICTAI)10.1109/ICTAI52525.2021.00157(985-990)Online publication date: Nov-2021

    View Options

    Get Access

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media