Volume 50 Issue 7
Jul.  2024
Turn off MathJax
Article Contents
TONG R Q,HU X N,LIU Y R,et al. Mining traffic detection based on automated private protocol identification[J]. Journal of Beijing University of Aeronautics and Astronautics,2024,50(7):2304-2313 (in Chinese) doi: 10.13700/j.bh.1001-5965.2022.0598
Citation: TONG R Q,HU X N,LIU Y R,et al. Mining traffic detection based on automated private protocol identification[J]. Journal of Beijing University of Aeronautics and Astronautics,2024,50(7):2304-2313 (in Chinese) doi: 10.13700/j.bh.1001-5965.2022.0598

Mining traffic detection based on automated private protocol identification

doi: 10.13700/j.bh.1001-5965.2022.0598
Funds:  Funding of Key Laboratory of Information System Security (CNKLSTISS-6142111190501)
More Information
  • Corresponding author: E-mail:zhang_n@mail.xidian.edu.cn
  • Received Date: 09 Jul 2022
  • Accepted Date: 16 Sep 2022
  • Available Online: 31 Mar 2023
  • Publish Date: 29 Mar 2023
  • To meet the demand for private protocol traffic detection and identification during cryptocurrency mining, an automated communication protocol traffic identification method for unknown mining behaviors was proposed. The N-gram message format segmentation algorithm and regular expression generation algorithm of the dictionary tree were improved, so as to automatically generate private protocol signatures and accurately match mining traffic during plaintext communications. Based on the classical encrypted traffic classification model, the traffic analysis method based on flow interaction features was improved, so as to achieve a lightweight mining behavior identification model and detect mining traffic during encrypted communications in real time. The test results show that the mining communication protocol signatures generated by the proposed method effectively cover the current three kinds of mainstream mining traffic during plaintext communications. The proposed method can achieve 0.996 identification accuracy and 0.985 recall rate in the real network verification process.

     

  • loading
  • [1]
    JIANG S R, LI Y Z, LU Q Y, et al. Policy assessments for the carbon emission flows and sustainability of Bitcoin blockchain operation in China[J]. Nature Communications, 2021, 12: 1938. doi: 10.1038/s41467-021-22256-3
    [2]
    SQUAREPANTS S. Bitcoin: A peer-to-peer electronic cash system[J]. SSRN Electronic Journal, 2008: 21260.
    [3]
    RUSSO M, ŠRNDIĆ N, LASKOV P. Detection of illicit cryptomining using network metadata[J]. EURASIP Journal on Information Security, 2021, 2021: 11. doi: 10.1186/s13635-021-00126-1
    [4]
    郑云超, 范渊, 黄进. 一种恶意挖矿行为识别方法、装置、设备及存储介质: CN113177791A[P]. 2021-07-27.

    ZHENG Y C, FAN Y, HUANG J. Malicious mining behavior identification method and device, equipment and storage medium: CN113177791A[P]. 2021-07-27(in Chinese).
    [5]
    邢宝玉, 白淳升. 基于GPU恶意挖矿行为的检测方法与装置: CN202010578925. XA[P]. 2020-06-23.

    XING B Y, BAI C S. Method and apparatus for detecting GPU malicious mining behavior based on extracted redundant strings: CN202010578925. XA[P]. 2020-06-23(in Chinese).
    [6]
    余文珣, 余斯聪, 钟英南, 等. 一种基于流量特征识别挖矿程序的方法和系统: CN202010123819.2[P]. 2020-10-12.

    YU W X, YU S C, ZHONG Y N, et al. A method and system for identifying mining programs based on traffic characteristics: CN202010123819.2[P]. 2020-10-12(in Chinese).
    [7]
    杨家海, 张世泽, 王之梁, 等. 基于时间序列追踪的挖矿流量检测方法和装置 CN202110203327.9[P] . 2021-10-20.

    YANG J H, ZHANG S Z, WANG Z L, et al. Mining traffic detection method and device based on time series tracking CN202110203327.9[P]. 2021-10-20(in Chinese).
    [8]
    PERDISCI R, LEE W K, FEAMSTER N. Behavioral clustering of HTTP-based malware and signature generation using malicious network traces[C]//Proceedings of the 7th USENIX Conference on Networked Systems Design and Implementation. New York: ACM, 2010: 26.
    [9]
    BEDDOE M A. Network protocol analysis using bioinformatics algorithms[EB/OL]. (2004-06-01)[2021-10-12]. http://phreakocious.net/PI/PI.pdf.
    [10]
    李峻辰, 程光, 杨刚芹. 基于网络流量的私有协议逆向技术综述[J]. 计算机研究与发展, 2023, 60(1): 167-190. doi: 10.7544/issn1000-1239.202110722

    LI J C, CHENG G, YANG G Q. Review of private protocol reverse technology based on network traffic[J]. Computer Research and Development, 2023, 60(1): 167-190(in Chinese). doi: 10.7544/issn1000-1239.202110722
    [11]
    BOSSERT G, GUIHERY F, HIET G. Towards automated protocol reverse engineering using semantic information[C]//Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security. New York: ACM, 2014: 51-62.
    [12]
    黎敏, 余顺争. 抗噪的未知应用层协议报文格式最佳分段方法[J]. 软件学报, 2013, 24(3): 604-617.

    LI M, YU S Z. Noise-tolerant and optimal segmentation of message formats for unknown application-layer protocols[J]. Journal of Software, 2013, 24(3): 604-617(in Chinese).
    [13]
    DE CARLI L, TORRES R, MODELO-HOWARD G, et al. Botnet protocol inference in the presence of encrypted traffic[C]//Proceedings of the IEEE Conference on Computer Communications. Piscataway: IEEE Press, 2017: 1-9.
    [14]
    BERNAILLE L, TEIXEIRA R. Early recognition of encrypted applications[C]//Proceedings of the Passive and Active Network Measurement. Berlin: Springer, 2007: 165-175.
    [15]
    DAINOTTI A, PESCAPE A, CLAFFY K C. Issues and future directions in traffic classification[J]. IEEE Network, 2012, 26(1): 35-40. doi: 10.1109/MNET.2012.6135854
    [16]
    VELAN P, ČERMÁK M, ČELEDA P, et al. A survey of methods for encrypted traffic classification and analysis[J]. Networks, 2015, 25(5): 355-374.
    [17]
    DRAPER-GIL G, LASHKARI A H, MAMUN M S I, et al. Characterization of encrypted and VPN traffic using time-related features[C]//Proceedings of the 2nd International Conference on Information Systems Security and Privacy. Setúbal: SciTePress, 2016: 407-414.
    [18]
    李慧慧, 张士庚, 宋虹, 等. 结合多特征识别的恶意加密流量检测方法[J]. 信息安全学报, 2021, 6(2): 129-142.

    LI H H, ZHANG S G, SONG H, et al. Robust malicious encrypted traffic detection based with multiple features[J]. Journal of Cyber Security, 2021, 6(2): 129-142(in Chinese).
    [19]
    LOTFOLLAHI M, SIAVOSHANI M J, ZADE R S H, et al. Deep packet: A novel approach for encrypted traffic classification using deep learning[J]. Soft Computing, 2020, 24(3): 1999-2012. doi: 10.1007/s00500-019-04030-2
    [20]
    KONDRAK G. N-gram similarity and distance[C]//Proceedings of the String Processing and Information Retrieval. Berlin: Springer, 2005: 115-126.
    [21]
    BENOV D M. The Manhattan project, the first electronic computer and the Monte Carlo method[J]. Monte Carlo Methods and Applications, 2016, 22(1): 73-79. doi: 10.1515/mcma-2016-0102
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Figures(9)  / Tables(1)

    Article Metrics

    Article views(310) PDF downloads(7) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return