Slide 1

Slide 1 text

See discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/324694302 Arming Malware with GANs Presentation · April 2018 CITATIONS 0 READS 104 1 author: Maria Rigaki Czech Technical University in Prague 5 PUBLICATIONS 3 CITATIONS SEE PROFILE All content following this page was uploaded by Maria Rigaki on 23 April 2018. The user has requested enhancement of the downloaded file.

Slide 2

Slide 2 text

Arming Malware with GANs Maria Rigaki [email protected] @mrigaki

Slide 3

Slide 3 text

Background Information ● PhD student at CVUT in Prague (advisor: Sebastian Garcia) ● Member of the Stratosphere Lab ● Machine Learning and Network Security ● Background in Software Development and Systems Engineering Photo from https://www.japanpowered.com/japan-culture/japans-warrior-women

Slide 4

Slide 4 text

What is this talk about? ● It is NOT about guns! ● Work based on our paper: “Rigaki M., Garcia S., Bringing a GAN to a knife-fight: Adapting Malware Communication to Avoid Detection” ● Soon to be published ● High level view of GANs ● An example of using GANs in a Network Security application

Slide 5

Slide 5 text

What are we trying to do? Can we use GANs to modify malware C&C traffic to mimic normal network traffic, in order to evade detectors while the communication channel remains effective?

Slide 6

Slide 6 text

Generative Adversarial Networks (GANs) Karras, T., Aila, T., Laine, S., & Lehtinen, J. (2017). Progressive growing of gans for improved quality, stability, and variation. arXiv preprint arXiv:1710.10196.

Slide 7

Slide 7 text

No content

Slide 8

Slide 8 text

Image from http://www.kdnuggets.com/20 17/01/generative-adversarial- networks-hot-topic-machine-l earning.html

Slide 9

Slide 9 text

Dataset ● Network captures of two Facebook users chatting for a day ● Extracted the Facebook related netflows ● Features: duration, byte size and time between consecutive flows ● Treated the data as time series ● Detector behavioral model

Slide 10

Slide 10 text

Malware ● RAT: https://github.com/fluproject/flu ● Client in C#, web server in php ● Client C&C periodic actions: a. checks if server is online, b. connects to the server & registers, c. downloads a list of commands to execute ● HTTP GET requests ● Adapted duration, byte size and time between consecutive flows

Slide 11

Slide 11 text

Detector ● Stratosphere IPS (SLIPS) https://www.stratosphereips.org/str atosphere-ips-suite ● Behavior-based detection ● Does not depend on static signatures / IOCs ● Models netflow characteristics such as periodicity, size, duration of flows ● Set to detect Facebook chat traffic 88*y*y*i*H*H*H*y*0yy*H*H*H*y*y*y*y *H*h*y*h*h*H*H*h*H*y*y*y*H*

Slide 12

Slide 12 text

Experiment Setup

Slide 13

Slide 13 text

Generator Discriminator Fake data Noise Facebook data Web service Flu client Win7 SLIPS1 C&C server Internet service Linux 1 Thanks to Ondrej Lukas for implementing SLIPS :)

Slide 14

Slide 14 text

Phase 1 Train GAN Malware C&C Block or not? Measure Every 5 minutes After 4 hours

Slide 15

Slide 15 text

Phase 2 Train GAN Malware C&C Block or not? Measure Every 5 minutes After 4 hours Add data Note: this approach showed that there is some improvement but not significant enough

Slide 16

Slide 16 text

Timing model of detection

Slide 17

Slide 17 text

Results

Slide 18

Slide 18 text

Detection Results - Phase 1

Slide 19

Slide 19 text

Efficiency - Phase 1 ● Maximum efficiency is 7.5 flows / time window ● 1 connection every 40 seconds

Slide 20

Slide 20 text

What’s next?

Slide 21

Slide 21 text

Future Work ● Add support for HTTPS ● Combine generator and malware ● Test with different types of traffic / detectors ● Incorporate in a red team tool ● Improve the feedback loop ● Automate the time window discovery

Slide 22

Slide 22 text

Discussion ● Yes we can! use GANs for mimicking traffic characteristics ● Other areas: censorship circumvention, network traffic generation ● Maybe an overkill now, but...

Slide 23

Slide 23 text

Thank you for listening! [email protected] @mrigaki mariarigaki https://www.stratosphereips.org/ View publication stats View publication stats