SlideShare a Scribd company logo
Network Dialog Minimization and Network Dialog Diffing: Two Novel Primitives of Network Security 
M. ZubairRafique 
zubair.rafique@cs.kuleuven.be 
Juan Caballero (IMDEA Software Institute) 
Christophe Huygens (iMinds-Distrinet, KU Leuven) 
WouterJoosen(iMinds-Distrinet, KU Leuven)
Network Trace 
Malicious SIP INIVTE Request 
VoIP Phones 
PCs 
SIP Servers 
Network Switch 
Gateway Router 
Internet 
Server Crashed
Attack traffic?
Drive-by Download Milkers 
Downloads a malware sample 
Browser plugin detected and vulnerabilities exploited 
Redirects to exploit kit landing page 
Navigate to given URL 
HoneyClient 
•Grier et al. “Manufacturing Compromise: The Emergence of Exploit-as-a-Service”, CCS 2012 
•Nappaet al. “Driving in the Cloud: An Analysis of Drive-by Download Operations and Abuse Reporting”, DIMVA 2013 
Downloads a malware sample 
Minimized Dialog, IPs, Time 
Milker
PCAP 
PCAP 
PCAP 
PCAP 
PCAP 
Unlabeled Malware Samples 
Malware Network Dialogs 
Compare Dialogs 
PCAP 
PCAP 
PCAP 
PCAP 
PCAP 
Cluster 1 
Cluster 2 
Cluster 3 
•Perdisciet al. “Behavioral Clustering of HTTP-Based Malware and Signature Generation Using Malicious Network Traces”, Computer Networks 
•Rafiqueet al. “Firma: Malware clustering and network signature generation with mixed network behaviors”, RAID 2013 
Dialog Clustering
In a nutshell … 
●Problem 
-Network Dialog Minimization 
-Network Dialog Diffing 
●Applications 
-Building drive-by download milkers 
-Cookie expiration validation 
-Simplifying user interfaces 
-Vulnerability analysis 
-Dialog clustering 
●Outcomes 
-Reduction in time and bandwidth 
-Perfect precision and high recall
Outline 
●Network Dialog Minimization 
●Network Dialog Diffing 
●Evaluation and Findings 
-Milkersfor 9 exploit kits (14000 malware samples) 
-17% top websites allow cookie replay >1 month 
-Savings of time per year and employee 
-New vulnerability in SIP server 
-Clustering 6 malware families (F-Meausre= 87.6%) 
●Limitations and Future Improvements
Network Dialog Minimization:“Given an original dialog that satisfies a goal, can we produce a minimized dialog comprising the smallest subset of the original dialog that when replayed still achieves the same goal as the original dialog?” 
Network Dialog Minimization
●Encode network dialog as dialog tree. 
Dialog Generation 
C2 
C1 
C3 
M1 
M2 
M3 
M4
Exploit 
kit 
Pre-filtering 
Filtered 
Nodes 
C:M:F 
C:M:F 
IPs 
Blackhole 1.x 
73 
6:6:60 
5:5:50 
2 
CoolExploit 
646 
18:58:569 
5:5:49 
2 
CritiXPack 
192 
4:19:168 
2:7:62 
2 
Eleonore 
936 
12:76:848 
8:66:736 
2 
Phoenix 
132 
12:12:107 
7:7:73 
1 
ProPack 
137 
10:12:114 
6:6:57 
2 
RedKit 
154 
8:17:128 
2:6:57 
1 
Serenity 
54 
5:5:43 
5:5:43 
1 
Unknown 
79 
5:7:66 
5:7:66 
2 
Dialog Generation 
Building Drive-by Download Milkers
Architecture
Network Delta Debugging 
Test Dialog 
Replay 
Remove Dialog 
Yes 
No 
Original Dialog 
Minimized Dialog 
Keep Dialog 
Goal
C2 
C1 
C3 
M1 
M2 
M3 
M4 
C2 
C3 
M2 
M4 
Network Delta Debugging
Network Delta Debugging 
●Generalized version of delta debugging 
-Reset Button 
-Goal beyond crashing the program 
-Hierarchical structure of dialog tree 
Zeller et al. “Simplifying and isolating failure-inducing input”, IEEE Transactions in Software Engineering. 
•NDM deals with remote networked applications. 
-commercial Virtual Network (VPN) that offers exit points in more than 50 countries (4500 IPs) 
Incorrect Minimization
L1 
L2 
L3 
Tree 
IPs 
GDT 
Time 
C:M:F 
C:M:F 
C:M:F 
Nodes 
used 
Pref. 
(sec.) 
2:2:22 
2:2:22* 
2:2:6 
11 
33 
157.0 
1:1:7 
1:1:7* 
1:1:3 
6 
15 
X 
42.5 
1:4:33 
1:1:7 
1:1:3 
6 
17 
X 
49.0 
1:1:8 
1:1:8* 
1:1:4 
7 
27 
X 
215.8 
1:1:7 
1:1:7* 
1:1:3 
6 
15 
X 
24.2 
1:1:7 
1:1:7* 
1:1:3 
6 
15 
X 
37.3 
2:6:57 
2:2:19 
2:2:10 
15 
71 
250.4 
2:2:15 
2:2:15* 
2:2:6 
11 
28 
X 
79.7 
1:2:14 
1:1:7 
1:1:3 
6 
18 
X 
51.0 
Exploit 
kit 
Blackhole 1.x 
CoolExploit 
CritiXPack 
Eleonore 
Phoenix 
ProPack 
RedKit 
Serenity 
Unknown 
Network Delta Debugging 
Building Drive-by Download Milkers
Network Dialog Diffing
Network Dialog Diffing:“Given two dialogs, identifying how similar they are, how to align them, and how to identify their common and different parts?” 
Network Dialog Diffing 
Rock.in 
Rock.in 
Dialog 1 
Dialog 2 
4 RRP 
3 RRP
sim(D1, D2) = (1/N) * Σ wi 
sim(D1, D2) = (0.9+1+1+0)/4 
= 2.9/4 
= 0.725 
i=1 
N 
Dialog Similarity
Evaluation and Findings
34 times faster than honey client. 
14000 malware downloaded from single machine. 
Drive-by Download Milkers 
Results Summary 
Cookie Expiration Validation 
71 times reduction in replay time. Savings of 20 hours of processing/day. 
31% of websites allows cookie replay (on logout). 17% cookies live over a month. 
Simplifying User Interface 
Savings of 3 hours per employee per year. 
Command line tool to perform building task. 
Vulnerability Analysis 
Finding new vulnerability in OpenSBCServer OSVDB 86607 (See details in the paper). 
Dialog Clustering 
Benign Dialogs (F-Measure = 100%), Malware Dialogs (F-Measure = 87.6%)
Results Summary 
34 times faster than honey client. 
14000 malware downloaded from single machine. 
Drive-by Download Milkers 
Cookie Expiration Validation 
71 times reduction in replay time. Savings of 20 hours of processing/day. 
31% of websites allows cookie replay (on logout). 17% cookies live over a month. 
Simplifying User Interface 
Savings of 3 hours per employee per year. 
Command line tool to perform building task. 
Vulnerability Analysis 
Finding new vulnerability in OpenSBCServer OSVDB 86607 (See details in the paper). 
Dialog Clustering 
Benign Dialogs (F-Measure = 100%), Malware Dialogs (F-Measure = 87.6%) 
OSVDB: 86607
34 times faster than honey client. 
14000 malware downloaded from single machine. 
Drive-by Download Milkers 
Results Summary 
Cookie Expiration Validation 
71 times reduction in replay time. Savings of 20 hours of processing/day. 
31% of websites allows cookie replay (on logout). 17% cookies live over a month. 
Simplifying User Interface 
Savings of 3 hours per employee per year. 
Command line tool to perform building task. 
Vulnerability Analysis 
Finding new vulnerability in OpenSBCServer OSVDB 86607 (See details in the paper). 
Dialog Clustering 
Benign Dialogs (F-Measure = 100%), Malware Dialogs (F-Measure = 87.6%) 
Clustering Results 
Dataset 
Algor. 
Clusters 
Precision 
Recall 
F-Measure 
Alexa 
PAM 
30 
100% 
100% 
100% 
Malware 
PAM 
10 
100% 
64.8% 
78.6% 
Alexa 
Agg. 
30 
100% 
100% 
100% 
Malware 
Agg. 
12 
100% 
78.0% 
87.6%
Limitations and Future Improvements 
●Minimized dialog may look suspicious 
●Dynamically generated requests 
●Achieving global minimum 
●Diffing of dialogs beyond HTTP
Conclusion 
●Introduce the problem of network dialog minimizationand present novelnetwork delta debuggingtechnique. 
●Propose a noveldialog diffing technique. 
●Applied our techniques to 5 different applications. 
-building drive-by download milkers 
-cookie expiration validation 
-simplifying user interfaces 
-vulnerability analysis 
-dialog clustering
Questions?

More Related Content

PDF
Creating an effective developer experience on Kubernetes
PDF
CSW2017 Qinghao tang+Xinlei ying vmware_escape_final
PDF
BlueHat v17 || Go Hunt: An Automated Approach for Security Alert Validation
PPTX
OSCC21 SceneGate, DreamGate, IMABox, and EchoVoice R&D
PPTX
Sandbox detection: leak, abuse, test - Hacktivity 2015
PPTX
Weave User Group Talk - DockerCon 2017 Recap
PPTX
DockerCon 16 General Session Day 1
PDF
Migration Effort in the Cloud - The Case of Cloud Platforms
Creating an effective developer experience on Kubernetes
CSW2017 Qinghao tang+Xinlei ying vmware_escape_final
BlueHat v17 || Go Hunt: An Automated Approach for Security Alert Validation
OSCC21 SceneGate, DreamGate, IMABox, and EchoVoice R&D
Sandbox detection: leak, abuse, test - Hacktivity 2015
Weave User Group Talk - DockerCon 2017 Recap
DockerCon 16 General Session Day 1
Migration Effort in the Cloud - The Case of Cloud Platforms

Similar to Network dialog minimization and network dialog diffing: Two novel primitives for network security applications (20)

PDF
Significance
PPT
Automated Abstraction of Flow of Control in a System of Distributed Software...
PDF
Itech 1005
PDF
Thug: a new low-interaction honeyclient
PPTX
Being HAPI! Reverse Proxying on Purpose
PDF
DOST 2016 Cloud Without Failures
PDF
Multi cloud security with cisco cloud services (Taras Kolodchyn)
PPT
Parallel_and_Cluster_Computing.ppt
PDF
Path to continuous delivery
PDF
Extending the life of your device (firmware updates over LoRa) - LoRa AMM
PDF
JS Fest 2019. Денис Радин. AAA 3D графика в Web с ReactJS, BabylonJS и Unity3D
PPTX
AAA 3D GRAPHICS ON THE WEB WITH REACTJS + BABYLONJS + UNITY3D by Denis Radin ...
PDF
Converged IO for HP ProLiant Gen8
DOCX
ARMITAGE-THE CYBER ATTACK MANAGEMENT
PDF
Static Software Watermarking
PDF
Making clouds: turning opennebula into a product
PDF
OpenNebulaConf 2013 - Making Clouds: Turning OpenNebula into a Product by Car...
PDF
Making Clouds: Turning OpenNebula into a Product
PPTX
Binary Analysis - Luxembourg
PPSX
Microservices Architecture - Cloud Native Apps
Significance
Automated Abstraction of Flow of Control in a System of Distributed Software...
Itech 1005
Thug: a new low-interaction honeyclient
Being HAPI! Reverse Proxying on Purpose
DOST 2016 Cloud Without Failures
Multi cloud security with cisco cloud services (Taras Kolodchyn)
Parallel_and_Cluster_Computing.ppt
Path to continuous delivery
Extending the life of your device (firmware updates over LoRa) - LoRa AMM
JS Fest 2019. Денис Радин. AAA 3D графика в Web с ReactJS, BabylonJS и Unity3D
AAA 3D GRAPHICS ON THE WEB WITH REACTJS + BABYLONJS + UNITY3D by Denis Radin ...
Converged IO for HP ProLiant Gen8
ARMITAGE-THE CYBER ATTACK MANAGEMENT
Static Software Watermarking
Making clouds: turning opennebula into a product
OpenNebulaConf 2013 - Making Clouds: Turning OpenNebula into a Product by Car...
Making Clouds: Turning OpenNebula into a Product
Binary Analysis - Luxembourg
Microservices Architecture - Cloud Native Apps
Ad

Recently uploaded (20)

PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Empathic Computing: Creating Shared Understanding
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Modernizing your data center with Dell and AMD
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PPTX
MYSQL Presentation for SQL database connectivity
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Machine learning based COVID-19 study performance prediction
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
cuic standard and advanced reporting.pdf
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
The Rise and Fall of 3GPP – Time for a Sabbatical?
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Dropbox Q2 2025 Financial Results & Investor Presentation
Empathic Computing: Creating Shared Understanding
Network Security Unit 5.pdf for BCA BBA.
Modernizing your data center with Dell and AMD
20250228 LYD VKU AI Blended-Learning.pptx
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
MYSQL Presentation for SQL database connectivity
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Machine learning based COVID-19 study performance prediction
Chapter 3 Spatial Domain Image Processing.pdf
Review of recent advances in non-invasive hemoglobin estimation
cuic standard and advanced reporting.pdf
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
NewMind AI Weekly Chronicles - August'25 Week I
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Mobile App Security Testing_ A Comprehensive Guide.pdf
Ad

Network dialog minimization and network dialog diffing: Two novel primitives for network security applications

  • 1. Network Dialog Minimization and Network Dialog Diffing: Two Novel Primitives of Network Security M. ZubairRafique zubair.rafique@cs.kuleuven.be Juan Caballero (IMDEA Software Institute) Christophe Huygens (iMinds-Distrinet, KU Leuven) WouterJoosen(iMinds-Distrinet, KU Leuven)
  • 2. Network Trace Malicious SIP INIVTE Request VoIP Phones PCs SIP Servers Network Switch Gateway Router Internet Server Crashed
  • 4. Drive-by Download Milkers Downloads a malware sample Browser plugin detected and vulnerabilities exploited Redirects to exploit kit landing page Navigate to given URL HoneyClient •Grier et al. “Manufacturing Compromise: The Emergence of Exploit-as-a-Service”, CCS 2012 •Nappaet al. “Driving in the Cloud: An Analysis of Drive-by Download Operations and Abuse Reporting”, DIMVA 2013 Downloads a malware sample Minimized Dialog, IPs, Time Milker
  • 5. PCAP PCAP PCAP PCAP PCAP Unlabeled Malware Samples Malware Network Dialogs Compare Dialogs PCAP PCAP PCAP PCAP PCAP Cluster 1 Cluster 2 Cluster 3 •Perdisciet al. “Behavioral Clustering of HTTP-Based Malware and Signature Generation Using Malicious Network Traces”, Computer Networks •Rafiqueet al. “Firma: Malware clustering and network signature generation with mixed network behaviors”, RAID 2013 Dialog Clustering
  • 6. In a nutshell … ●Problem -Network Dialog Minimization -Network Dialog Diffing ●Applications -Building drive-by download milkers -Cookie expiration validation -Simplifying user interfaces -Vulnerability analysis -Dialog clustering ●Outcomes -Reduction in time and bandwidth -Perfect precision and high recall
  • 7. Outline ●Network Dialog Minimization ●Network Dialog Diffing ●Evaluation and Findings -Milkersfor 9 exploit kits (14000 malware samples) -17% top websites allow cookie replay >1 month -Savings of time per year and employee -New vulnerability in SIP server -Clustering 6 malware families (F-Meausre= 87.6%) ●Limitations and Future Improvements
  • 8. Network Dialog Minimization:“Given an original dialog that satisfies a goal, can we produce a minimized dialog comprising the smallest subset of the original dialog that when replayed still achieves the same goal as the original dialog?” Network Dialog Minimization
  • 9. ●Encode network dialog as dialog tree. Dialog Generation C2 C1 C3 M1 M2 M3 M4
  • 10. Exploit kit Pre-filtering Filtered Nodes C:M:F C:M:F IPs Blackhole 1.x 73 6:6:60 5:5:50 2 CoolExploit 646 18:58:569 5:5:49 2 CritiXPack 192 4:19:168 2:7:62 2 Eleonore 936 12:76:848 8:66:736 2 Phoenix 132 12:12:107 7:7:73 1 ProPack 137 10:12:114 6:6:57 2 RedKit 154 8:17:128 2:6:57 1 Serenity 54 5:5:43 5:5:43 1 Unknown 79 5:7:66 5:7:66 2 Dialog Generation Building Drive-by Download Milkers
  • 12. Network Delta Debugging Test Dialog Replay Remove Dialog Yes No Original Dialog Minimized Dialog Keep Dialog Goal
  • 13. C2 C1 C3 M1 M2 M3 M4 C2 C3 M2 M4 Network Delta Debugging
  • 14. Network Delta Debugging ●Generalized version of delta debugging -Reset Button -Goal beyond crashing the program -Hierarchical structure of dialog tree Zeller et al. “Simplifying and isolating failure-inducing input”, IEEE Transactions in Software Engineering. •NDM deals with remote networked applications. -commercial Virtual Network (VPN) that offers exit points in more than 50 countries (4500 IPs) Incorrect Minimization
  • 15. L1 L2 L3 Tree IPs GDT Time C:M:F C:M:F C:M:F Nodes used Pref. (sec.) 2:2:22 2:2:22* 2:2:6 11 33 157.0 1:1:7 1:1:7* 1:1:3 6 15 X 42.5 1:4:33 1:1:7 1:1:3 6 17 X 49.0 1:1:8 1:1:8* 1:1:4 7 27 X 215.8 1:1:7 1:1:7* 1:1:3 6 15 X 24.2 1:1:7 1:1:7* 1:1:3 6 15 X 37.3 2:6:57 2:2:19 2:2:10 15 71 250.4 2:2:15 2:2:15* 2:2:6 11 28 X 79.7 1:2:14 1:1:7 1:1:3 6 18 X 51.0 Exploit kit Blackhole 1.x CoolExploit CritiXPack Eleonore Phoenix ProPack RedKit Serenity Unknown Network Delta Debugging Building Drive-by Download Milkers
  • 17. Network Dialog Diffing:“Given two dialogs, identifying how similar they are, how to align them, and how to identify their common and different parts?” Network Dialog Diffing Rock.in Rock.in Dialog 1 Dialog 2 4 RRP 3 RRP
  • 18. sim(D1, D2) = (1/N) * Σ wi sim(D1, D2) = (0.9+1+1+0)/4 = 2.9/4 = 0.725 i=1 N Dialog Similarity
  • 20. 34 times faster than honey client. 14000 malware downloaded from single machine. Drive-by Download Milkers Results Summary Cookie Expiration Validation 71 times reduction in replay time. Savings of 20 hours of processing/day. 31% of websites allows cookie replay (on logout). 17% cookies live over a month. Simplifying User Interface Savings of 3 hours per employee per year. Command line tool to perform building task. Vulnerability Analysis Finding new vulnerability in OpenSBCServer OSVDB 86607 (See details in the paper). Dialog Clustering Benign Dialogs (F-Measure = 100%), Malware Dialogs (F-Measure = 87.6%)
  • 21. Results Summary 34 times faster than honey client. 14000 malware downloaded from single machine. Drive-by Download Milkers Cookie Expiration Validation 71 times reduction in replay time. Savings of 20 hours of processing/day. 31% of websites allows cookie replay (on logout). 17% cookies live over a month. Simplifying User Interface Savings of 3 hours per employee per year. Command line tool to perform building task. Vulnerability Analysis Finding new vulnerability in OpenSBCServer OSVDB 86607 (See details in the paper). Dialog Clustering Benign Dialogs (F-Measure = 100%), Malware Dialogs (F-Measure = 87.6%) OSVDB: 86607
  • 22. 34 times faster than honey client. 14000 malware downloaded from single machine. Drive-by Download Milkers Results Summary Cookie Expiration Validation 71 times reduction in replay time. Savings of 20 hours of processing/day. 31% of websites allows cookie replay (on logout). 17% cookies live over a month. Simplifying User Interface Savings of 3 hours per employee per year. Command line tool to perform building task. Vulnerability Analysis Finding new vulnerability in OpenSBCServer OSVDB 86607 (See details in the paper). Dialog Clustering Benign Dialogs (F-Measure = 100%), Malware Dialogs (F-Measure = 87.6%) Clustering Results Dataset Algor. Clusters Precision Recall F-Measure Alexa PAM 30 100% 100% 100% Malware PAM 10 100% 64.8% 78.6% Alexa Agg. 30 100% 100% 100% Malware Agg. 12 100% 78.0% 87.6%
  • 23. Limitations and Future Improvements ●Minimized dialog may look suspicious ●Dynamically generated requests ●Achieving global minimum ●Diffing of dialogs beyond HTTP
  • 24. Conclusion ●Introduce the problem of network dialog minimizationand present novelnetwork delta debuggingtechnique. ●Propose a noveldialog diffing technique. ●Applied our techniques to 5 different applications. -building drive-by download milkers -cookie expiration validation -simplifying user interfaces -vulnerability analysis -dialog clustering