Chrome Extension
WeChat Mini Program
Use on ChatGLM

Anteater: Advanced Persistent Threat Detection With Program Network Traffic Behavior

Yangzong Zhang,Wenjian Liu, Kaiian Kuok,Ngai Cheong

IEEE ACCESS(2024)

Cited 0|Views2
No score
Abstract
Recent stealth attacks cleverly disguise malicious activities, masquerading as ordinary connections to popular online services through seemingly innocuous applications. These methods often evade detection by traditional network monitoring or signature-based techniques, as attackers frequently hide Command and Control (C&C) servers within well-known cloud service providers, making the traffic anomalies appear normal. In this paper, we introduce an application-level monitoring system, Anteater. Anteater constructs a detailed profile for each legitimate software's network traffic behavior, outlining the expected traffic patterns. By scrutinizing a program's network traffic configuration, Anteater efficiently pinpoints and intercepts the IP addresses associated with abnormal program access. Implemented in a real-world enterprise environment, Anteater was tested on a dataset containing over 400 million real-world network traffic sessions. The evaluation results demonstrate that Anteater achieves a high detection rate for malware injections, boasting a true positive rate of 94.5% and a false positive rate of less than 0.1%.
More
Translated text
Key words
Malware injection detection,advanced persistent threat,program traffic behavior,network security,Anteater
AI Read Science
Must-Reading Tree
Example
Generate MRT to find the research sequence of this paper
Chat Paper
Summary is being generated by the instructions you defined