Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Mates: Drift-Adaptive Cobalt Strike Encrypted Traffic Detection Based on Multi-Space Feature Modeling and Fusion

View through CrossRef
Cobalt Strike (CS) attacks using encrypted HTTPS channels have become the primary type of ransomware and advanced persistent threat attacks. The detection of malicious CS traffic is not only hindered by certificate impersonation and a lack of cryptographic semantics but also severely exacerbated by frequent attack strategy changes, which induce concept drift in traffic features, ultimately leading to a precipitous decline in detection model performance. Existing concept drift adaptation methods in malicious traffic detection typically rely on manually labeled data, which have high annotation costs and response latency. In this paper, multi-space feature modeling and fusion (Mates), an encrypted CS traffic detection framework, is proposed. Mates models features in multiple data spaces and performs feature fusion, thereby enhancing the feature representation of encrypted traffic and representing a new mechanism for adapting to concept drift. In terms of feature representation, we integrate three complementary feature spaces, including TLS handshake semantics, ciphertext payloads, and packet temporal statistics, and utilize handshake plaintext semantics to guide ciphertext feature learning. To address the issue of concept drift, a test-time adaptation mechanism for Mates is proposed based on multi-space prototypes, which dynamically updates the prototypes using high-confidence samples, enabling the model to automatically adapt to distribution shifts without manual labeling. We conduct extensive experiments on real-world datasets encompassing various drift scenarios. The results show that Mates achieves effective adaptation utilizing minimal unlabeled target samples, with an F1 score 3.43% higher than that of the current state-of-the-art adaptive methods.
Title: Mates: Drift-Adaptive Cobalt Strike Encrypted Traffic Detection Based on Multi-Space Feature Modeling and Fusion
Description:
Cobalt Strike (CS) attacks using encrypted HTTPS channels have become the primary type of ransomware and advanced persistent threat attacks.
The detection of malicious CS traffic is not only hindered by certificate impersonation and a lack of cryptographic semantics but also severely exacerbated by frequent attack strategy changes, which induce concept drift in traffic features, ultimately leading to a precipitous decline in detection model performance.
Existing concept drift adaptation methods in malicious traffic detection typically rely on manually labeled data, which have high annotation costs and response latency.
In this paper, multi-space feature modeling and fusion (Mates), an encrypted CS traffic detection framework, is proposed.
Mates models features in multiple data spaces and performs feature fusion, thereby enhancing the feature representation of encrypted traffic and representing a new mechanism for adapting to concept drift.
In terms of feature representation, we integrate three complementary feature spaces, including TLS handshake semantics, ciphertext payloads, and packet temporal statistics, and utilize handshake plaintext semantics to guide ciphertext feature learning.
To address the issue of concept drift, a test-time adaptation mechanism for Mates is proposed based on multi-space prototypes, which dynamically updates the prototypes using high-confidence samples, enabling the model to automatically adapt to distribution shifts without manual labeling.
We conduct extensive experiments on real-world datasets encompassing various drift scenarios.
The results show that Mates achieves effective adaptation utilizing minimal unlabeled target samples, with an F1 score 3.
43% higher than that of the current state-of-the-art adaptive methods.

Related Results

Aplikasi Digital Marketing Public Relations Miracle Mates
Aplikasi Digital Marketing Public Relations Miracle Mates
Abstract. Digital marketing is currently one of the most popular Marketing media to support various activities. The goal is to use advertising to promote and sell products through ...
The Nuclear Fusion Award
The Nuclear Fusion Award
The Nuclear Fusion Award ceremony for 2009 and 2010 award winners was held during the 23rd IAEA Fusion Energy Conference in Daejeon. This time, both 2009 and 2010 award winners w...
MODELİNG OF TRAFFİC LİGHT CONTROL SYSTEMS
MODELİNG OF TRAFFİC LİGHT CONTROL SYSTEMS
Traffic light control systems are commonly utilized to monitor and manage the flow of autos across multiple road intersections. Since traffic jams are ubiquitous in daily life, A c...
TYPES OF AI ALGORİTHMS USED İN TRAFFİC FLOW PREDİCTİON
TYPES OF AI ALGORİTHMS USED İN TRAFFİC FLOW PREDİCTİON
The increasing complexity of urban transportation systems and the growing volume of vehicles have made traffic congestion a persistent challenge in modern cities. Efficient traffic...
Intrusion Detection in IoT Data Streams based onEMNCD with Concept Drift
Intrusion Detection in IoT Data Streams based onEMNCD with Concept Drift
Abstract With the widespread application of smart devices, the security of IoT systems faces entirely new challenges. The IoT data stream operates in a non-stationary, dyna...
A new sea ice state dependent parameterization for the free drift of sea ice
A new sea ice state dependent parameterization for the free drift of sea ice
Abstract. Free drift estimates of sea ice motion are necessary to produce a seamless observational record combining buoy and satellite-derived sea ice motion vectors. We develop a ...
Explainable Anomaly Detection in Encrypted Network Traffic Using Data Analytics
Explainable Anomaly Detection in Encrypted Network Traffic Using Data Analytics
The unsanctioned growth of the encrypted network traffic is a two-sided problem for the cybersecurity, on one hand, it preserves the privacy of the users, and, on the other hand, i...
Enmob: Unveil the Behavior with Multi-flow Analysis of Encrypted App Traffic
Enmob: Unveil the Behavior with Multi-flow Analysis of Encrypted App Traffic
Abstract In the contemporary digital landscape, mobile applications have become the predominant conduit for internet connectivity and daily tasks. Simultaneously, the adv...

Back to Top