论文标题
基于ML的隧道检测和隧道应用分类
ML-based tunnel detection and tunneled application classification
论文作者
论文摘要
加密的隧道协议被广泛使用。除业务和个人用途外,恶意参与者还部署隧道以阻碍命令,控制和数据剥落的检测。维持隧道可见性的一种常见方法是依靠网络流量元数据和机器学习来分析隧道的发生而无需实际解密数据。但是,解决隧道协议的现有工作表现出了几个弱点:它们的目标是检测隧道内的应用,而不是隧道识别,它们表现出有限的协议覆盖范围(例如,未解决OpenVPN和Wirederguard),并且不一致的功能和多样化的机器学习技术使得绩效比较变得困难。 我们的工作做出了四个贡献,可以解决这些局限性并提供进一步的分析。首先,我们解决OpenVPN和Vireguard。其次,我们提出了一条完整的管道来检测和分类隧道协议和隧道应用程序。第三,我们对网络流量元数据功能和机器学习技术的性能进行了详尽的分析。第四,我们提供了有关背景未隧道流量的领域概括,以及有关最大传输单元(MTU)的域概括和对抗性学习。
Encrypted tunneling protocols are widely used. Beyond business and personal uses, malicious actors also deploy tunneling to hinder the detection of Command and Control and data exfiltration. A common approach to maintain visibility on tunneling is to rely on network traffic metadata and machine learning to analyze tunnel occurrence without actually decrypting data. Existing work that address tunneling protocols however exhibit several weaknesses: their goal is to detect application inside tunnels and not tunnel identification, they exhibit limited protocol coverage (e.g. OpenVPN and Wireguard are not addressed), and both inconsistent features and diverse machine learning techniques which makes performance comparison difficult. Our work makes four contributions that address these limitations and provide further analysis. First, we address OpenVPN and Wireguard. Second, we propose a complete pipeline to detect and classify tunneling protocols and tunneled applications. Third, we present a thorough analysis of the performance of both network traffic metadata features and machine learning techniques. Fourth, we provide a novel analysis of domain generalization regarding background untunneled traffic, and, both domain generalization and adversarial learning regarding Maximum Transmission Unit (MTU).