SlideShare a Scribd company logo
1 of 81
Deciphering Malware’s use of TLS (without
Decryption)
Blake Anderson
Cisco
[email protected]
Subharthi Paul
Cisco
[email protected]
David McGrew
Cisco
[email protected]
Abstract—The use of TLS by malware poses new challenges
to network threat detection because traditional pattern-matching
techniques can no longer be applied to its messages. However,
TLS also introduces a complex set of observable data features
that allow many inferences to be made about both the client
and the server. We show that these features can be used to
detect and understand malware communication, while at the
same
time preserving the privacy of benign uses of encryption. These
data features also allow for accurate malware family attribution
of network communication, even when restricted to a single,
encrypted flow.
To demonstrate this, we performed a detailed study of how
TLS is used by malware and enterprise applications. We provide
a general analysis on millions of TLS encrypted flows, and a
targeted study on 18 malware families composed of thousands
of unique malware samples and ten-of-thousands of malicious
TLS flows. Importantly, we identify and accommodate the bias
introduced by the use of a malware sandbox. The performance
of a malware classifier is correlated with a malware family’s
use
of TLS, i.e., malware families that actively evolve their use of
cryptography are more difficult to classify.
We conclude that malware’s usage of TLS is distinct from
benign usage in an enterprise setting, and that these differences
can be effectively used in rules and machine learning
classifiers.
I. INTRODUCTION
Encryption is necessary to protect the privacy of end users.
In a network setting, Transport Layer Security (TLS) is the
dominant protocol to provide encryption for network traffic.
While TLS obscures the plaintext, it also introduces a complex
set of observable parameters that allow many inferences to be
made about both the client and the server.
Legitimate traffic has seen a rapid adoption of the TLS
standard over the past decade, with some studies stating that
as much as 60% of network traffic uses TLS [1]. Unfortunately,
malware has also adopted TLS to secure its communication. In
our dataset, ∼10% of the malware samples use TLS. This trend
makes threat detection more difficult because it renders the
use of deep packet inspection (DPI) ineffective. It is important
to determine whether encrypted network traffic is benign or
malicious, and do so in a way that preserves the integrity of
the encryption. And while 10% of malware samples utilizing
TLS seems low, we make the assumption that this number will
increase as the level of encryption in network traffic increases.
Along these lines, we have seen a slight, but statistically
significant, increase in malicious, encrypted traffic over the
past 12 months.
To further motivate the need for a study exposing mal-
ware’s use of TLS, we consider the limitations of a pattern-
matching approach when faced with TLS, and analyzed a
popular community Intrusion Protection System (IPS) rule set
[32]. As of this writing, there were 3,437 rules in that set,
3,307 of which inspect packet contents. Only 48 rules were
TLS specific, and of those, only 6 detected malware, using
strings in self-signed certificates. Of the remainder, 19 detect
Heartbleed or other overflow attacks against TLS implemen-
tations, and 23 detect plaintext over ports typically assigned
to TLS. These numbers show that traditional signature-based
techniques have not heavily invested in TLS-specific malware
signatures to date. However, the rules that match certificate
strings hint that it is possible to detect malware through the
passive inspection of TLS. Our goal in this paper to confirm
and substantiate this idea, by identifying data features and
illustrating methodologies that allow for the creation of rules
and machine learning classifiers that can detect malicious,
encrypted network communication. For instance, we identify
features of both the TLS client and server gathered from
unencrypted handshake messages that could be used to create
IPS rules.
In this paper, we provide a comprehensive study of mal-
ware’s use of TLS by observing the unencrypted TLS hand-
shake messages. We give a high-level overview of malware’s
use of TLS compared to what we have observed on an
enterprise network. Enterprise traffic typically uses up-to-date
cryptographic parameters that are indicative of up-to-date TLS
libraries. On the other hand, malware typically uses older and
weaker cryptographic parameters. Malware’s usage of TLS is
distinct compared to enterprise traffic, and, for most families,
this fact can be leveraged to accurately classify malicious
traffic patterns. We examine these difference from both a TLS
client and a TLS server perspective.
In addition to our in-depth technical analysis, it is inter-
esting to note the general tone that malware authors have
towards encryption. There is an FAQ section in the open-
sourced Zeus/Zbot malware [3] where the following question
and answer occur (content left as is):
Question: Why traffic is encrypted with symmetric
encryption method (RC4), but not asymmetric (RSA)?
Answer: Because, in the use of sophisticated algorithms
it makes no sense, encryption only needs to hide traffic.
In the current privacy climate, this attitude most certainly does
not hold for enterprise network traffic [4], [26]. Again, this
ar
X
iv
:1
60
7.
01
63
9v
1
[
cs
.C
R
]
6
J
ul
2
01
6
divergence is another tool we can take advantage of to more
accurately classify malicious flows.
When applying machine learning classifiers on a per-family
basis, it is clear that some families/subfamilies are more
difficult to classify. Our goal is not to show optimized machine
learning classifiers, but rather to identify what characteristics
of the specific family make it difficult to classify. For instance,
we can correlate poor classifier performance on encrypted
traffic patterns with one family’s use of strong [33] and varied
cryptography. We also examine additional features extracted
from unencrypted TLS handshake messages that significantly
increase the performance of the classifiers. In general, we have
found this approach to be fruitful: identify weaknesses in the
features used to represent a flow on a per-family basis, and then
augment that representation with more informative features.
Finally, we show how we can perform family attribution
given only network based data. This problem is positioned as a
multi-class classification problem where each malware family
has its own label. We identify families who use identical TLS
parameters, but can still be accurately classified because their
traffic patterns with respect to other flow-based features are
distinct. We also identify subfamilies of malware that cannot be
distinguished from one another with only their network data.
We are able to achieve an accuracy of 90.3% for the family
attribution problem when restricted to a single, encrypted flow,
and an accuracy of 93.2% when we make use of all encrypted
flows within a 5-minute window.
We use a commercial sandbox environment to collect the
first five minutes of a malware sample’s network activity.
We collected tens-of-thousands of unique malware samples
and hundreds-of-thousands of malicious, encrypted flows from
these samples. We collected millions of TLS encrypted flows
from an enterprise network to compare against the malware
data. We used an open source project to collect the data
and transform it to a JSON format that contained the typical
network 5-tuple, the sequence of packet lengths and inter-
arrival times, the byte distribution, and the unencrypted TLS
handshake information. All of the analysis done in this paper
uses only network data, and does not assume an endpoint
presence.
The remainder of the paper is organized as follows: Section
II outlines some basic assumptions we make with respect to
the data and our methodology, and Section III reviews how
we obtained our data, specifies the datasets we use for each
experiment, and what features we use to classify the network
flows. Section IV gives an overview of how malware’s usage
of TLS differs from that of an enterprise network from both
the perspective of a TLS client and a TLS server. Section V
shows which families are difficult to classify from a network
flow point-of-view, and explains why this is the case, and
Section VI gives results showing how we can attribute a flow
to a particular family. Section VII reviews previous and related
work, Section VIII outlines some limitations of our approach,
and finally, we conclude in Section IX.
II. PRELIMINARIES AND ASSUMPTIONS
Our primary concern in this paper is to categorize and
classify malicious, TLS encrypted flows. While we do use the
serverHello and certificate messages to highlight
Port Percentage of TLS Flows
443 98.4%
9001 1.2%
80 0.1%
9101 0.1%
9002 0.1%
TABLE I: Based on malware data collected between August
2015 and May 2016, we investigated which ports malware used
the most for TLS Encrypted communication.
some interesting features about the servers that the malware
samples are connecting to, our main focus is client oriented.
The classification algorithms we develop are heavily dependent
on client-based features, which allows our algorithms to cor-
rectly classify a malicious agent connecting to google.com
versus a typical enterprise agent connecting to google.com,
i.e., we can leverage the client’s cryptographic parameters to
differentiate these two events. For this reason, we do not filter
the malware’s TLS traffic to only include command and control
flows, but also allow other types of TLS-encrypted traffic such
as click-fraud.
In this paper, we focus on TLS encrypted flows over
port 443 to make the comparisons between enterprise TLS
and malicious TLS be as unbiased as possible. To further
motivate this choice, Table I lists the 5 most used ports for
TLS by the malware samples collected between August 2015
and May 2016. To determine if a flow was TLS, we used
deep packet inspection and a custom signature based on the
TLS versions and message types of the clientHello and
serverHello messages. In total, we found 229,364 TLS
flows across 203 unique ports, and port 443 was by far the
most common port for malicious TLS. Although the diversity
of port usage in malware was great, these diverse ports were
relatively uncommon.
Given that our non-malware data was collected on an
enterprise network, it naturally follows that the categorization
and classification results presented in this paper are most
applicable to the enterprise setting. We do not claim that these
results hold for the general class of networks, e.g., service
provider data. That being said, we do believe that securing
enterprise networks is an important use case and that the
conclusions presented in this paper offer enterprise network
operators significantly novel and valuable results.
The enterprise network data used in this paper was initially
filtered using a well known IP blacklist [10]. This removed
∼0.05% of the initial traffic. After this filtering stage, we take
the data “as-is”. We are aware that there is most likely more
malicious traffic in this dataset, but this fact is just taken as a
base assumption for reasons of practicality.
III. DATA
The data for this paper was collected from a commer-
cial sandbox environment where users can submit suspicious
executables. Each submitted sample is allowed to run for 5
minutes. The full packet capture is collected and stored for
each sample. Due to constraints of the sandbox environment,
2
Malware Family Unique Samples Encrypted Flows
Bergat 192 332
Deshacop 69 129
Dridex 38 103
Dynamer 118 372
Kazy 228 1,152
Parite 111 275
Razy 117 564
Sality 612 1,200
Skeeyah 81 218
Symmi 494 2,618
Tescrypt 137 205
Toga 156 404
Upatre 377 891
Virlock 1,208 12,847
Virtob 115 511
Yakes 100 337
Zbot 1,291 2,902
Zusy 179 733
Total 5,623 25,793
TABLE II: Summary of the malicious families used in our
analysis. We collected 18 malicious families, 5,623 malicious
samples, and 25,793 encrypted flows that successfully negoti-
ated the TLS handshake and sent application data.
all network traffic observed in the sandbox is considered to be
that of the originally submitted sample. For instance, if sample
A downloads and installs B and C, then the traffic generated
from B and C would be considered A’s.
This method of data collection is straightforward, and while
it ignores some details about what is occurring on the endpoint,
it is consistent with our goal of understanding each sample
based solely on its network communications. Some biases were
introduced with this approach. First, to reduce the number of
false positives, we only considered samples that were known
bad. In this setting, known bad means hitting on four or more
antivirus convictions from unique vendors in VirusTotal [2].
Second, due to hardware constraints, the samples are only
allowed to run for 5 minutes in a Windows XP-based virtual
machine. Any encrypted network traffic that happens after this
initial 5 minute window will not be captured. Similarly, any
samples that are not compatible with Windows XP will not
run in this environment.
The enterprise data was collected from an enterprise net-
work with ∼500 active users and ∼4,000 unique IP addresses.
The majority of the machines on this network run Windows
7, with the second most popular operating system being OS X
El Capitan.
A. Dataset and Sample Selection
The malware traffic used in this paper was collected from
August 2015 to May 2016, and the enterprise traffic was
collected during a 4 day period in May 2016 and a 4 day period
in June 2016. In this work, we performed several experiments
on different subsets of this data.
We first analyze the differences between the TLS pa-
rameters typically seen on an enterprise network versus the
TLS parameters used by the general malware population. To
proceed, we first removed all of the TLS flows that offered
an ordered ciphersuite list that matched a list found in the
default Windows XP SChannel implementation [23]. This
was done to help ensure that the TLS clients we observed
were representative of the malware’s behavior and not that of
the TLS library provided by the underlying operating system.
This removed ∼40% of the malicious TLS flows and ∼0.4% of
the enterprise TLS flows. After this filtering stage, we used all
of the TLS flows in our dataset. From August 2015 until May
2016, we collected 133,744 TLS flows initiated by malicious
programs. During the 4 day periods in May and June 2016,
we collected 1,500,005 TLS flows from an enterprise network.
All of these TLS flows successfully negotiated the full TLS
handshake and sent application data.
To analyze the differences between the TLS parameters
used by different malware families, we used the malware sam-
ples from October 2015 to May 2016 that had an identifiable
family name. Table II gives a summary of the number of
samples and flows for each malware family. The family name
was generated by a majority vote from the signatures provided
by VirusTotal [2]. Malware samples without a clear family
name were discarded, i.e., any sample without at least four
different antivirus programs using the same name (ignoring
common names such as Trojan). Family names with less
than 100 flows were not used. This process pruned our original
set of 20,548 samples that used TLS to 5,623 unique samples
across 18 families. It is difficult to determine the family, if any,
associated with a malware sample, even with the information
provided through dynamic analysis in a sandbox setting. These
samples generated 25,793 TLS encrypted flows that success-
fully negotiated the TLS handshake and sent application data.
In this paper, we also make use of machine learning
classifiers in three experiments. The first is to demonstrate the
value of the additional TLS features through 10-fold cross-
validation. For this experiment, we use all of the malicious
TLS flows collected from August 2015 until May 2016, and a
random subset of the May and June 2016 enterprise network’s
TLS flows. In total, there were 225,740 malicious and 225,000
enterprise flows for this experiment. To account for the bias
that the Windows XP-based sandbox could introduce, we also
present results on a dataset composed of only flows that offered
an ordered ciphersuite list that did not match a list found in
the default Windows XP SChannel implementation: 133,744
malicious and 135,000 enterprise TLS flows.
In the next set of experiments, we analyzed how well a
trained classifier is able to detect the TLS flows generated by
the different malware families. To train the classifier, we used
the same 225,000 enterprise flows as above for the negative
class, and 76,760 malicious TLS flows collected during August
and September 2015 for the positive class. The testing data
consisted of the TLS flows from October 2015 to May 2016
that could be assigned a ground truth family as described
above. Again, Table II gives a summary of the number of
samples and flows for each malware family. While we do
not remove flows that offered an ordered ciphersuite list that
matched a list found in the default Windows XP SChannel
implementation in this experiment, we do make explicit the
3
families that have this bias.
Finally, to assess the malware family attribution potential of
TLS handshake metadata, we used 10-fold cross-validation and
multi-class classification on the data listed in Table II. Again,
we do not remove samples that offered an ordered ciphersuite
list that matched a list found in the default Windows XP
SChannel implementation in this experiment because all of
the samples would have the same bias.
B. Feature Extraction
To extract the data features of interest, we wrote software
tools to extract the data features of interest from live traffic
or packet capture files. The open source project will export
all of the data in a convenient JSON format. The machine
learning classifiers are built using traditional flow features,
traditional “side-channel” features, and features collected from
the unencrypted TLS handshake messages.
1) Flow Metadata: The first set of features investigated are
modeled around traditional flow data that is typically collected
in devices configured to export IPFIX/NetFlow. These features
include the number of inbound bytes, outbound bytes, inbound
packets, outbound packets; the source and destination ports;
and the total duration of the flow in seconds. These features
were normalized to have zero mean and unit variance.
2) Sequence of Packet Lengths and Times.: The sequence
of packet lengths and packet inter-arrival times (SPLT) has
been well studied [25], [39]. In our open source imple-
mentation, the SPLT elements are collected for the first 50
packets of a flow. Zero-length payloads (such as ACKs) and
retransmissions are ignored.
A Markov chain representation is used to model the SPLT
data. For both the lengths and times, the values are discretized
into equally sized bins, e.g., for the length data, 150 byte bins
are used where any packet size in the range [0,150) will go
into the first bin, any packet size in the range [150,300) will go
into the second bin, etc. A matrix A is then constructed where
each entry, A[i,j], counts the number of transitions between
the i’th and j’th bin. Finally, the rows of A are normalized to
ensure a proper Markov chain. The entries of A are then used
as features to the machine learning algorithms.
3) Byte Distribution.: The byte distribution is a length-256
array that keeps a count for each byte value encountered in
the payloads of the packets for each packet in the flow. The
byte value probabilities can be easily computed by dividing the
byte distribution counts by the total number of bytes found in
the packets’ payloads. The 256 byte distribution probabilities
are used as features by the machine learning algorithms.
The full byte distribution provides a lot of information about
the encoding of the data. Additionally, the byte distribution
can give information about the header-to-payload ratios, the
composition of the application headers, and if any poorly
implemented padding is added.
4) Unencrypted TLS Header Information.: TLS (Transport
Layer Security) is a cryptographic protocol that provides
privacy for applications. TLS is usually implemented on top of
common protocols such as HTTP for web browsing or SMTP
for email. HTTPS is the usage of TLS over HTTP, which is
the most popular way of securing communication between a
web server and client, and is supported by most major web
servers. HTTPS typically uses port 443.
The TLS version, the ordered list of offered ciphersuites,
and the list of supported TLS extensions are collected from
the client hello message. The selected ciphersuite and
selected TLS extensions are collected from the server
hello message. The server’s certificate is collected from the
certificate message. The client’s public key length is
collected from the client key exchange message, and
is the length of the RSA ciphertext or DH/ECDH public key,
depending on the ciphersuite. Similar to the sequence of packet
lengths and times, the sequence of record lengths, times, and
types is collected from TLS sessions.
In our classification algorithms, the list of offered cipher-
suites, the list of advertised extensions, and the client’s public
key length were used. 176 offered ciphersuite hex codes were
observed in our full dataset, and a binary vector of length
176 was created where a one is assigned to each ciphersuite
in the list of offered ciphersuites. Similarly, we observed 21
unique extensions, and a binary vector of length 21 was created
where a one is assigned to each extension in the list of
advertised extensions. Finally, the client’s public key length
was represented as a single integer value. In total, 198 TLS
client-based features were used in the classification algorithms.
In some experiments, we use an additional TLS server-based
binary feature: whether the certificate was self-signed or not.
IV. MALWARE FAMILIES AND TLS
Although malware uses TLS to secure its communication,
our data suggests that for the majority of the families we
analyzed, malware’s use of TLS is quite distinct from that
of the enterprise network’s traffic. In this section, we highlight
these differences from the perspective of the TLS client and
also from the perspective of the TLS server.
For the comparisons between general malware and enter-
prise traffic, we first removed all of the TLS flows that offered
an ordered ciphersuite list that matched a list found in the
default Windows XP SChannel implementation [22], [29]
from our full dataset. We found that ∼40% of TLS flows
from malware samples offered this list. To help ensure that
our analysis was capturing trends in the malware’s use of
TLS, and not that of the underlying operating system, we
removed all of these flows. After this filtering stage, we used
all of the TLS flows in our dataset. From August 2015 to May
2016, we collected 133,744 TLS flows initiated by malicious
programs that successfully negotiated the full TLS handshake
and sent application data. In May and June 2016, we collected
1,500,005 TLS flows from an enterprise network using the
same criteria.
The malware data collection process can introduce biases
in terms of malware family representation, and the conclusions
that can be made from the TLS parameters collected. To
account for this, we also analyze the TLS clients that malware
uses and the TLS servers that malware connects to on a per-
family basis. In this analysis, we highlight the families that
use the default Windows TLS library, and the families which
include their own TLS client. The data for this experiment is
listed in Table II.
4
00
2f
00
35
00
0a
c0
13
c0
09
c0
0a
c0
14
c0
2b
c0
2f
00
05
00
04
00
6b
0
20
40
60
80
100
P
er
ce
nt
ag
e
of
F
lo
w
s
Offered Ciphersuites
00
0b
00
0a
00
0d
00
05
00
23 ff0
1
00
10
33
74
00
17
00
12
00
15
75
50
00
0f
0
20
40
60
80
100
Advertised TLS Extensions
Benign
Malware
512
(EC
DH
E_R
SA)
768
(EC
DH
E_R
SA)
204
8 (R
SA)
512
(EC
DH
E_E
CD
SA)
204
8 (D
HE
_RS
A)
0
10
20
30
40
50
60
P
er
ce
nt
ag
e
of
F
lo
w
s
Client's Public Key Length
Fire
fox
47
Chr
ome
51IE 1
1
Saf
ari
9.0
.x
Chr
ome
50
Saf
ari
9
Fire
fox
46
Ope
ra 1
2
Tor
0.2
.x
Ope
ra 1
5
0
5
10
15
20
25
30
TLS Client
Fig. 1: Malware’s use of TLS versus that of enterprise network
traffic relative to the TLS client features. Some values and the
full ciphersuite names were omitted for clarity of presentation.
Ciphersuites and extensions are represented as hex codes, which
are given in full in Appendix A.
A. TLS Clients
1) Malware versus Enterprise: Figure 1 illustrates the
differences between the malware’s and the enterprise’s us-
age of TLS with respect to the TLS clients after filter-
ing typical Windows XP ciphersuite lists. Nearly 100%
of the enterprise TLS sessions offered the 0x002f
(TLS_RSA_WITH_AES_128_CBC_SHA) ciphersuite and the
0x0035 (TLS_RSA_WITH_AES_256_CBC_SHA) cipher-
suite. On the other hand, nearly 100% of the malicious TLS
sessions observed offered:
• 0x000a
(TLS_RSA_WITH_3DES_EDE_CBC_SHA)
• 0x0005 (TLS_RSA_WITH_RC4_128_SHA)
• 0x0004 (TLS_RSA_WITH_RC4_128_MD5)
These three ciphersuites are considered weak, and although the
enterprise traffic we observed does offer these ciphersuites, it
does not offer them with the same frequency that the malicious
traffic does.
The differences in malware and enterprise’s TLS client
hello messages become more evident when the advertised
TLS extensions are considered. We observed a much greater
diversity in the TLS extensions that enterprise clients adver-
tised. Almost half of the enterprise clients would advertise up
to 9 extensions, but the malicious clients would only consis-
tently advertise one: 0x000d (signature_algorithms),
an RFC MUST in most circumstances [13]. The following four
extensions were observed in ∼50% of the enterprise traffic and
rarely observed in the malicious traffic:
• 0x0005 (status_request)
• 0x0010 (supported_groups)
• 0x3374 (next_protocol_negotiation)
• 0x0017 (extended_master_secret)
The client’s public key length, taken from the client
key exchange message, has discriminatory power. As il-
lustrated in Figure 1, most of the enterprise traffic used a
512-bit (ECDHE_RSA) public key. In contrast, malware almost
exclusively used a 2048-bit (DHE_RSA) public key.
5
Malware Number Most Seen Number of Distinct Most
Frequently Client’s
Family of Flows TLS Client Ciphersuite Offer Vectors
Advertised Extension Public Key
Bergat 332 IE 8* 1 None 2048-bit (RSA)
Deshacop 129 Tor Browser 4 3 SessionTicket TLS 2048-bit
(RSA)
Dridex 103 IE 11 5 ec_point_formats 2048-bit (RSA)
supported_groups
renegotiation_info
Dynamer 372 Tor 0.2.2 10 SessionTicket TLS 512-bit
(ECDHE_RSA)
Kazy 1152 IE 8* 5 None 2048-bit (RSA)
Parite 275 IE 8* 11 None 2048-bit (RSA)
Razy 564 Tor Browser 4 8 None 2048-bit (RSA)
Sality 1,200 IE 8* 133 None 2048-bit (RSA)
Skeeyah 218 Tor 0.2.7 11 SessionTicket TLS 512-bit
(ECDHE_RSA)
Symmi 2,618 Opera 15 19 ec_point_formats 512-bit
(ECDHE_RSA)
supported_groups
Tescrypt 205 IE 8* 6 None 2048-bit (RSA)
Toga 404 Tor 0.2.2 2 SessionTicket TLS 2048-bit (RSA)
ec_point_formats
supported_groups
Upatre 891 IE 8* 3 None 2048-bit (RSA)
Virlock 12,847 Opera 12 1 signature_algorithms 2048-bit
(DHE_RSA)
Virtob 511 IE 8* 4 None 2048-bit (RSA)
Yakes 337 IE 8* 3 None 2048-bit (RSA)
Zbot 2,902 IE 8* 12 None 2048-bit (RSA)
Zusy 733 IE 8* 7 None 2048-bit (RSA)
TABLE III: The most popular TLS client configurations for the
18 malicious families. The TLS client was estimated using TLS
fingerprinting techniques [29]. For TLS extensions, in the case
of a tie, all equally probable extensions are listed. (*) indicates
the fingerprint of the TLS client provided by the underlying
sandbox operating system.
Finally, we mapped the TLS client parameters to well
known client programs that use specific TLS libraries and
configurations [29]. This information could be spoofed, but we
feel that this is still a valuable and compact way to represent
a client. As shown in Figure 1, the most popular clients for
malware and enterprise TLS connections are quite distinct. In
the enterprise setting, we found that the four most common
client configurations resembled the most recent releases of
the four most popular browsers: Firefox 47, Chrome 51,
Internet Explorer 11, and Safari 9. On the other
hand, malware most frequently used TLS client parameters
that matched those of Opera 12, Firefox 46, and Tor
0.2.x.
2) Malware Families: Table III gives the most popular
TLS client parameters for each of the 18 malware families we
had access to. The most popular TLS client was Internet
Explorer 8, which was used most frequently by 10 of
the 18 families. These families and client values are listed
for completeness, but should more accurately be read as
utilizing the TLS library provided by the underlying Windows
environment.
The Tor client and browser were very popular among the
malware families, being the most popular with Deshacop,
Dynamer, Razy, Skeeyah, and Toga. Dynamer, Skeeyah, and
Symmi all used a 512-bit (ECDHE_RSA) public key as opposed
to the most popular public key: 2048-bit (RSA), which is most
likely an artifact of the underlying Windows environment.
Table III also lists the number of distinct ciphersuite offer
vectors observed for each malware family. In this context, a
client is taken to be unique if it has a different set of offered ci-
phersuites and advertised extensions. Some families have very
few unique clients, e.g., Bergat. On the other hand, Sality has
a large number of distinct ciphersuite offer vectors. And while
Sality’s most used TLS client offered parameters similar to
Internet Explorer 8, it had hundreds of other unique
combinations of offered ciphersuites and advertised extensions.
B. TLS Servers
1) Malware versus Enterprise: Figure 2 illustrates the
differences between the servers connected to by the malware
and the enterprise TLS clients after filtering clients that used
typical Windows XP ciphersuite lists. The filtering was done
for the server statistics because those clients have a significant
impact on what is sent in the server hello message.
As seen in Figure 2, the selected ciphersuites of the
server hello messages are sharply divided for the major-
ity of enterprise and malicious TLS sessions. The following
four ciphersuites were selected by ∼90% of the servers that
malware communicated with:
• 0x000a
(TLS_RSA_WITH_3DES_EDE_CBC_SHA)
6
c0
2f
00
35
c0
30
c0
14
c0
2b
00
39
00
0a
00
04
00
6b
00
05
00
2f
0
10
20
30
40
50
60
P
er
ce
nt
ag
e
of
F
lo
w
s
Selected Ciphersuites
ff0
1
00
0b
00
00
00
10
00
17
00
23
00
05
00
0f
33
74
0
10
20
30
40
50
60
Selected TLS Extensions
Benign
Malware
73
05 83
36
51
63
58
59
36 37
5
0
2
4
6
8
10
12
14
P
er
ce
nt
ag
e
of
F
lo
w
s
Validity of Certificate (In Days)
2 1 10 5 7 12 3
0
10
20
30
40
50
Number of SAN Entries
Fig. 2: Malware’s use of TLS versus that of enterprise network
traffic relative to the TLS server features. Some values and the
full ciphersuite names were omitted for clarity of presentation.
Ciphersuites and extensions are represented as hex codes, which
are given in full in Appendix A.
• 0x0004 (TLS_RSA_WITH_RC4_128_MD5)
• 0x006b
(TLS_DHE_RSA_WITH_AES_256_CBC_SHA256)
• 0x0005 (TLS_RSA_WITH_RC4_128_SHA)
These ciphersuites were rarely selected by servers that
enterprise hosts communicated with. TLS_RSA_WITH
_RC4_128_MD5 and TLS_RSA_WITH_RC4_128_SHA are
considered weak.
As one would expect given the lack of advertised TLS
extensions by the malware clients, the servers that malware
communicated with rarely selected TLS extensions. On the
other hand, the servers that the enterprise hosts communicated
with had a much greater diversity in the selected TLS exten-
sions with 0xff01 (renegotiation_info) and 0x000b
(ec_point_formats) being the most frequent.
We also analyzed information from the servers’ certifi-
cates. As anticipated, we found that enterprise endpoints most
frequently connected to servers with the following certificate
subjects:
• *.google.com
• api.twitter.com
• *.icloud.com
• *.g.doubleclick.net
• *.facebook.com
This distribution of certificate subjects was very long tailed.
The certificate subjects of servers that the malware sam-
ples communicated with also had a long tail. These certifi-
cates were mostly composed of subjects that had charac-
teristics of a domain generation algorithm (DGA) [6], e.g.,
www.33mhwt2j.net. Although malware mostly communi-
cated with servers that had suspicious certificate subjects, it is
also clear that malware communicates with many inherently
benign servers, e.g., google.com for connectivity checks
or twitter.com for command and control. The following
certificate subjects were the most frequent for TLS flows
initiated by malware:
• block.io
• *.wpengine.com
• *.criteo.com
7
Malware Number Unique Number of Selected Certificate
Family of Flows Server IPs SS Certs Ciphersuite Subject
Bergat 332 12 0 TLS_RSA_WITH_3DES_EDE_CBC_SHA
www.dropbox.com
Deshacop 129 38 0 TLS_RSA_WITH_3DES_EDE_CBC_SHA
*.onion.to
Dridex 103 10 89 TLS_RSA_WITH_AES_128_CBC_SHA
amthonoup.cy
Dynamer 372 155 3
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
www.dropbox.com
Kazy 1152 225 52 TLS_RSA_WITH_3DES_EDE_CBC_SHA
*.onestore.ms
Parite 275 128 0 TLS_RSA_WITH_3DES_EDE_CBC_SHA
*.google.com
Razy 564 118 16 TLS_RSA_WITH_RC4_128_SHA baidu.com
Sality 1,200 323 4 TLS_RSA_WITH_3DES_EDE_CBC_SHA
vastusdomains.com
Skeeyah 218 90 0
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
www.dropbox.com
Symmi 2,618 700 22
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA *.criteo.com
Tescrypt 205 26 0 TLS_RSA_WITH_3DES_EDE_CBC_SHA
*.onion.to
Toga 404 138 8 TLS_RSA_WITH_3DES_EDE_CBC_SHA
www.dropbox.com
Upatre 891 37 155 TLS_RSA_WITH_RC4_128_MD5
*.b7websites.net
Virlock 12,847 1 0
TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 block.io
Virtob 511 120 0 TLS_RSA_WITH_3DES_EDE_CBC_SHA
*.g.doubleclick.net
Yakes 337 51 0 TLS_RSA_WITH_RC4_128_SHA baidu.com
Zbot 2,902 269 507 TLS_RSA_WITH_RC4_128_MD5
tridayacipta.com
Zusy 733 145 14 TLS_RSA_WITH_3DES_EDE_CBC_SHA
*.criteo.com
TABLE IV: TLS server configurations for the servers most
visited by the 18 malicious families. The certificate subject
typically
has a long tail, but only the most frequent is reported. The
reported number of self-signed certificates is not necessarily
related
to the most popular certificate subject.
• baidu.com
• *.google.com
Because the DGA-like certificate subjects are counted as
unique, they do not show up in this list.
Figure 2 highlights two other interesting features associated
with server certificates: the validity of the certificate in days
and the number of subjectAltName entries. Interestingly,
the high prevalence of connections to block.io, a Bitcoin
wallet, heavily skewed the validity (375 days) and number of
subjectAltName entries (3) for the certificates of servers
that malware connected to.
It is also interesting to note the frequency of TLS servers
using certificates that are self-signed. In the enterprise data,
1,352 out of the 1,500,005 TLS sessions, or ∼0.09%, used
a self-signed certificate. In the malware data, 947 out of the
133,744 TLS sessions, or ∼0.7%, used a self-signed certificate,
which is roughly an order of magnitude more frequent than the
enterprise case.
2) Malware Families: Table IV lists several interesting
statistics about the servers that malware most often connects
to. Some of the malicious families connect to a large number
of unique IP addresses, e.g., Symmi and Dynamer. The family
with the most flows, Virlock, only connects to 1 unique IP
address owned by block.io.
We observed 10 families that made use of self-signed
certificates. ZBot was the most frequent offender, with the
subject of these certificates being tridayacipta.com, a
domain name that has many detections on VirusTotal [2].
Common certificate subjects also allow one to make infer-
ences about the tools that the malware families use and the
functionality that the families support. For instance, Deshacop
and Tescrypt have *.onion.to as the most common certifi-
cate subject, and, as anticipated, both have many samples that
have TLS client configurations that indicate that they use the
Tor Browser. The Tor Browser is the most prevalent
client for Deshacop, and the second most prevalent client
for Tescrypt. Symmi’s most common certificate subject is
*.criteo.com, an ad service. This could indicate Symmi’s
intent to perform click-fraud.
V. CLASSIFYING ENCRYPTED TRAFFIC
We used a logistic regression classifier with an l1 penalty
[20] for all classification results. For the initial binary-class
classification results, we trained four machine learning classi-
fiers using different subsets of data features we collected. The
first classifier used the flow metadata (Meta), the sequence
of packet lengths and inter-arrival times (SPLT), and the
distribution of bytes (BD). The second classifier only used
the TLS information (TLS). The third classifier was trained
using the same features as the first, with the addition of the
TLS client information, specifically, the offered ciphersuites,
advertised extensions, and the client’s public key length. The
fourth classifier was trained with all data, and an additional,
custom feature: whether the server certificate was self-signed
(SS).
A. Malware versus Enterprise
To demonstrate the value of the additional TLS features in
a classification setting, we use 10-fold cross-validation and all
8
All Data No SChannel
Dataset Total Accuracy 0.01% FDR Total Accuracy 0.01% FDR
Meta+SPLT+BD+TLS+SS 99.6% 92.6% 99.6% 87.4%
Meta+SPLT+BD+TLS 99.6% 92.8% 99.6% 87.2%
TLS 98.2% 63.8% 96.7% 59.1%
Meta+SPLT+BD 98.9% 1.3% 98.5% 0.9%
TABLE V: Classifier accuracy for different combinations of
data features, showing the overall accuracy and the accuracy at
a
0.01% FDR.
Malware Family Meta+SPLT TLS Only Meta+SPLT All+SS
+BD +BD+TLS
Bergat* 100.0% 100.0% 100.0% 100.0%
Kazy* 98.5% 99.5% 99.8% 100.0%
Parite* 99.3% 97.8% 99.6% 99.6%
Sality* 95.0% 94.1% 97.7% 98.0%
Tescrypt* 89.8% 95.6% 97.6% 97.6%
Upatre* 99.9% 98.7% 100.0% 100.0%
Virtob* 99.2% 98.8% 99.4% 99.4%
Yakes* 88.7% 98.5% 99.7% 99.7%
Zbot* 98.9% 99.6% 99.7% 100.0%
Zusy* 98.6% 88.7% 99.9% 99.9%
Deshacop 93.0% 63.6% 96.1% 96.1%
Dridex 16.5% 68.7% 78.5% 97.9%
Dynamer 95.4% 78.8% 95.7% 96.5%
Razy 91.5% 77.1% 95.9% 96.8%
Skeeyah 95.9% 82.1% 98.6% 98.6%
Symmi 99.1% 92.4% 99.8% 99.8%
Toga 100.0% 100.0% 100.0% 100.0%
Virlock 100.0% 100.0% 100.0% 100.0%
TABLE VI: Classifier accuracy when separated by family.
Families with an (*) offered an ordered ciphersuite list that
matched a
list found in the default Windows XP SChannel implementation.
Malware data from August and September 2015, and enterprise
data from May and June 2016 were used for training; these
malware samples were collected from October 2015 to May
2016.
Results using unencrypted TLS handshake messages are given
in addition to results based on only standard side-channel
features.
The two baselines are the first two data columns: side-channel-
only and TLS-only.
of the malicious TLS flows collected from August 2015 until
May 2016, and a random subset of the May and June 2016
enterprise network’s TLS flows. In total, there were 225,740
malicious and 225,000 enterprise flows for this experiment.
To account for the bias that the Windows XP-based sandbox
could introduce, we also present results on a dataset composed
of only flows that did not offer an ordered ciphersuite list that
matched a list found in the default Windows XP SChannel
implementation [29]: 133,744 malicious and 135,000 enter-
prise TLS flows.
The 10-fold cross-validation results for the above problem
is shown in Table V. We see that using all available data
views significantly improves the results. A 1-in-10,000 false
discovery rate (FDR) is defined as the accuracy on the positive
class given that only 1 false positive is allowed for every
10,000 true positives. As these results show, not using TLS
header information leads to significantly worse performance,
especially in the important case of a fixed, 1-in-10,000 FDR.
The removal of the Windows XP SChannel TLS flows had
no effect on the total accuracy of the classifiers based on all
data views, but does reduce the performance at a 1-in-10,000
FDR by ∼5%.
B. Malware Families
To determine how well a trained classifier is able to detect
the TLS flows generated by the different malware families,
we first trained the four classifiers from Table V on the
same 225,000 enterprise flows as above for the negative class,
and 76,760 malicious TLS flows collected during August and
September 2015 for the positive class. These binary classifiers
were applied to the testing data consisting of the TLS flows
from October 2015 to May 2016, summarized in Table II.
While we do not remove flows that offered an ordered cipher-
suite list that matched a list found in the default Windows XP
SChannel implementation in this experiment, we do make
9
c0
14
c0
13
c0
0a
c0
09
00
35
00
2f
00
0a
00
05
00
04
00
3d
00
3c
00
fd
00
6b
00
67
00
39
00
33
0
20
40
60
80
100
P
er
ce
nt
ag
e
of
F
lo
w
s
Offered Ciphersuites
00
0b
00
0a ff0
1
00
0d
00
23
00
0f
00
00
0
20
40
60
80
100
Advertised TLS Extensions
Dridex
Virlock
204
8 (R
SA)
512
(EC
DH
E_R
SA) 206
4
205
6
204
8
0
20
40
60
80
100
P
er
ce
nt
ag
e
of
F
lo
w
s
Client's Public Key Length
IE 1
1 IE 9 IE 1
0 IE 8
Fire
fox
46
Ope
ra 1
2 1
7
0
20
40
60
80
100
TLS Client
Fig. 3: Dridex’s use of TLS versus that of Virlock’s. Some
values and the full ciphersuite names were omitted for clarity of
presentation. Ciphersuites and extensions are represented as hex
codes, which are given in full in Appendix A.
explicit the families that have this bias in the majority of their
flows.
Table VI lists the classification accuracy of the four classi-
fiers for each family. Because only malware data was used to
test the trained classifiers, false positives for this experiment
are ill-defined and are therefore not reported. In the August
and September 2015 malware training data, there was strong
representation of the malicious families presented in this paper,
but there were not any exact SHA1 matches. There were four
families that had no representation in August or September:
Bergat, Yakes, Razy, and Dridex.
For the most part, combining traditional flow metadata,
typical side-channel information, and the TLS specific features
led to the best performing machine learning models. Out of all
families, our classifiers with all data views performed the worst
on Deshacop with a 96.1% true positive rate. With respect to
only the malware families that primarily used ciphersuites sim-
ilar to those used by Windows XP SChannel-based clients,
our classifiers with all data views performed the worst on
Tescrypt with a 97.6% true positive rate. Both of these families
most often visited servers with a server certificate subject of
*.onion.to, and use TLS client configurations that indicate
the Tor Browser for some of their TLS connections. This
is particularly interesting because a major goal of the Tor
Browser is to maintain the privacy of its users, which in this
case are the malware families.
The classifier based only on the TLS data was able to
perform quite well on the malware families that used TLS
client configurations that matched those of Windows XP
SChannel-based clients, but this result is not guaranteed
to hold if the malware runs on another operating system.
The TLS-only classifier performed the worst on most of the
families that used TLS client configurations that did not match
those of Windows XP SChannel-based clients, with the
exception of Toga and Virlock. Both of these families did a
poor job at varying the TLS client parameters in our dataset,
and they both used TLS client parameters that indicated older
versions of clients: Toga → Tor 0.2.2 and Virlock →
Opera 12.
The machine learning classifiers were able to perform
reasonably on most malware families, with the exception of
Dridex. Dridex was one of four families that did not have
10
pa
ri
te
te
sc
ry
pt
zb
ot
ka
zy
zu
sy
sa
lit
y
ya
ke
s
ra
zy
de
sh
ac
op
be
rg
at
up
at
re
vi
rt
ob
sk
ee
ya
h
dy
na
m
er
sy
m
m
i
to
ga
vi
rl
oc
k
dr
id
ex
parite
tescrypt
zbot
kazy
zusy
sality
yakes
razy
deshacop
bergat
upatre
virtob
skeeyah
dynamer
symmi
toga
virlock
dridex
Malware Similarity Matrix w.r.t. TLS Usage
0.1
0.2
0.3
0.4
0.5
0.6
0.7
0.8
0.9
1.0
Fig. 4: Similarity Matrix for the different malware families with
respect to the observed TLS client’s parameters.
any representation in the training data. The classifier on the
other three families, Bergat, Yakes, and Razy, had ∼96-100.0%
total accuracy. In the case of Bergat and Yakes, this good
performance is expected because these families offered an
ordered ciphersuite list that matched a list found in the default
Windows XP SChannel implementation.
Figure 3 shows Dridex’s use of TLS from a client point-
of-view. Unlike most of the other families, Dridex most often
selects:
• 0x002f (TLS_RSA_WITH_AES_128_CBC_SHA)
Figure 2 shows that this ciphersuite is not uncommon for
enterprise TLS sessions. Dridex also advertises several TLS
extensions and offers many current ciphersuites in the client
hello message.
Figure 3 also compares Dridex’s TLS usage with that of
Virlock’s. Virlock is an example of a malicious family that used
the same TLS client for every sample that we observed, and
was able to be easily classified, i.e., all four classifiers
achieved
100% accuracy. While Dridex offers a variety of strong cipher-
suites, Virlock offers a smaller set of outdated ciphersuites.
Virlock also only advertises the signature_algorithms
TLS extensions. Another significant difference between these
two families is that Virlock did not alter its TLS client’s
behavior once in our entire dataset. Virlock always used the
same client parameters that are similar to those of Opera 12.
Virlock’s lack of adaptation makes it trivial for a machine
learning, or a rule-based, system to classify. Dridex’s use of
multiple TLS clients made a significant difference in terms of
detection efficacy.
As we now show, awareness of self-signed certificates
proved to be crucial. The classification of Dridex using
Meta+SPLT+BD+TLS, 78.5%, does not inspire confidence in
a system designed to detect malicious, encrypted traffic. Our
hypothesis was that, although Dridex varies the behavior of
its TLS clients, there might be an invariant with the servers
that Dridex communicates with that would allow us to more
easily classify these encrypted flows. Upon manual inspection,
this hypothesis was confirmed. We included a binary feature
indicating whether the server certificate was self-signed (de-
noted as SS), and retrained our machine learning classifier
with this new feature. The 10-fold cross-validation results on
the training data were nearly identical. With the self-signed
feature, the new classifier with all data sources achieved an
accuracy of 97.9% on Dridex, a significant improvement.
VI. FAMILY ATTRIBUTION
Being able to accurately attribute malware samples to a
known family is highly valuable. Attribution provides incident
responders with actionable prior information before they begin
to reverse engineer malware samples. From a network point-
of-view, this attribution can help to prioritize the incident
responders time, i.e., available resources should be assigned
to investigate more serious infections. In these results, there
are no enterprise samples; we only consider malicious samples
and their associated families.
To analyze the differences between the TLS parameters
used by different malware families, we used the malware
samples from October 2015 to May 2016 that had an iden-
tifiable family name as described in Section III. This process
pruned our original set of 20,548 samples to 5,623 unique
samples across 18 families. These samples generated 25,793
TLS encrypted flows that successfully negotiated the full TLS
handshake and sent application data.
11
ka
zy
sy
m
m
i
vi
rl
oc
k
ya
ke
s
ra
zy
zu
sy
de
sh
ac
op
zb
ot
te
sc
ry
pt
pa
ri
te
sa
lit
y
vi
rt
ob
to
ga
up
at
re
be
rg
at
dy
na
m
er
sk
ee
ya
h
dr
id
ex
Predicted label
kazy
symmi
virlock
yakes
razy
zusy
deshacop
zbot
tescrypt
parite
sality
virtob
toga
upatre
bergat
dynamer
skeeyah
dridex
T
ru
e
la
be
l
Confusion Matrix (Total Accuracy=90.3%)
0.0
0.1
0.2
0.3
0.4
0.5
0.6
0.7
0.8
0.9
1.0
Fig. 5: Confusion matrix for the 18-class malware family
classifier. The total 10-fold accuracy of the machine learning
model
was 90.3%.
A. Similar TLS Usage
Figure 4 shows a similarity matrix for the 18 malware fam-
ilies with respect to their TLS clients. The offered ciphersuites,
advertised extensions, and the client’s public key length were
used as features, and a standard squared exponential similarity
function was used to compute the similarity values:
exp
i,j
(xi −xj)2
with λ = 1, and xi being the mean of the feature vectors for
the i’th family. The diagonal of this matrix will be 1.0 because
each family will be perfectly self-similar.
There is a lot of structure in Figure 4. The upper left
block consists of families that have some number of flows
that use the default Windows XP TLS library. The group
of Skeeyah, Dynamer, Symmi, and Toga all heavily make
use of offered ciphersuite lists and advertised extensions that
are indicative of Tor 0.2.x. Dridex and Virlock were the
two most dissimilar malware families. And while Dridex was
difficult to accurately classify, Virlock was trivial. Uniqueness
is not always a desirable quality.
B. Multi-Class Classification
Finally, to assess the malware family attribution potential
of TLS flows, we used the data listed in Table II, and did not
remove samples that offered an ordered ciphersuite list that
matched a list found in the default Windows XP SChannel
implementation in this experiment because all of the samples
would have the same bias. We position the problem of attribut-
ing a malicious TLS flow to a known malware family as a
multi-class classification problem. For this analysis, we use all
of the malware families and data features described in Section
III. Similar to the enterprise versus malware results in Section
V, we used 10-fold cross validation and l1− multinomial
logistic regression [21]. We not only present our results in
terms of overall classification accuracy, but also as a confusion
matrix showing the true positives and false positives broken
down per-family. This was done to illustrate that we were not
simply using a naı̈ ve majority-class classifier, but were in fact
making useful inferences.
Using all available data features led to the best cross-
validated performance, with a total accuracy of 90.3% for the
18-class classification problem using a single, encrypted flow.
The confusion matrix for this problem is shown in Figure 5.
For a given row (family) in the confusion matrix, the column
entries represent the percentage of samples identified as that
specific family. A perfect confusion matrix would have all of
its weight focused on the diagonal. As an example, most of
Kazy’s TLS flows, the first row, were identified as Kazy, the
first column. Some of Kazy’s TLS flows were also identified
as Symmi (column: 2), Yakes (column: 4), Razy (column: 5),
and Zbot (column: 8).
The majority of the TLS flows were attributed to the
appropriate family with ∼80-90% accuracy. Again, the two
exceptions are Dridex and Virlock. Attribution for these two
families are trivial, in large part because of their distinctive
use of TLS compared to other malicious families.
There were two sets of two families that the multiclass
classification algorithm had problems differentiating. The first
of these was Bergat and Dynamer. Interestingly, Bergat used a
Windows XP SChannel-like TLS client, but Dynamer used
12
a tor 0.2.2-like TLS client. The confusion came from the
other data views, specifically the sequence of packet lengths.
Both of these families most often connected to servers at
www.dropbox.com, and had similar communication pat-
terns.
Finally, Yakes and Razy were another two malicious fam-
ilies that the multi-class classifier could not differentiate. Like
Bergat and Dynamer, Yakes and Razy most often connected
to servers at baidu.com. In fact, these two families are
subfamilies of the Ramnit family. Upon manual inspection, the
network behavior of Yakes and Razy looked mostly identical.
Determining the malware family based on a single, en-
crypted flow is an unnecessarily difficult problem. In our
dataset, the malware samples often created many encrypted
flows that can be used for attribution. In this framework, one
could initially classify all of the flows in a 5 minute sliding
window for a given host, and use the suspicious flows to
perform family attribution. We first trained an independent
flow, multi-class classifier. Then, for each window in the
testing set, each flow was classified, and a majority vote was
used to classify all flows within the window. This is similar
to ensemble methods in machine learning [16]. The confusion
matrix resulting from 10-fold cross validation on this problem
looked very similar to that shown in Figure 5. The accuracy
of the multi-class problem increased from 90.3% using single,
encrypted flows to 93.2% using a simplistic multiple flow
algorithm. While there were several families that had improved
performance, this simple, multi-flow scheme increased the
accuracy of Yakes and Razy most notably. This was most likely
because Razy was more promiscuous.
VII. RELATED WORK
Identifying threats in encryption poses significant chal-
lenges. Nevertheless, the security community has put forth two
solutions to solve this problem. The first involves decrypting
all traffic that flows through a security appliance: Man-in-
the-Middle (MITM) [9]. Once the traffic has been decrypted,
traditional signature-based methods, such as Snort [31], can
be applied. While this approach can be successful at finding
threats, there are several important shortcomings. First, this
method does not respect the privacy of the users on the
network. Second, this method is computationally expensive
and difficult to deploy and maintain. Third, this method relies
on malware clients and servers to not change their behavior
when a MITM interposes itself.
The second method of identifying threats in encrypted
network traffic leverages flow-based metadata. These methods
examine high-level features of a network flow, such as the
number of packets and bytes within a flow. This data is typi-
cally exported and stored as IPFIX [12] or NetFlow [11]. There
have been several papers that push the limits of traditional
flow monitoring systems. For instance, [8] uses NetFlow and
external reputation scores to classify botnet traffic. This work
can also be applied to encrypted network traffic, but does not
take advantage of the TLS-specific data features.
In addition to pure flow-based features to detect malware’s
network traffic, there has been many papers that augment
this data with more detailed features about a flow [14], [18],
[24], [34], [35], [36], [37], [39]. This work can been seen
as utilizing side-channel attacks, such as analyzing the sizes
and inter-arrival times of packets, to learn more information
about a flow. In [27], the authors derive features based on the
packet sizes to perform website fingerprinting attacks against
encrypted traffic. In our work, we are only concerned with
identifying malware communication and we use information
specific to the TLS protocol.
There has been previous work that uses active probing [17]
and passive monitoring to gain visibility into how TLS is used
in the wild [19]. Unlike [19], our results specifically highlight
malware’s use of the TLS protocol, and show how data features
from TLS can be used in rules and classifiers.
Malware clustering and family attribution has had a lot
of exposure in the academic literature [5], [7], [28], [30]. This
work has taken a variety of data source, e.g, HTTP or dynamic
system call traces, and clustered the samples to attribute a
sample to a malicious family. In contrast, our work gives an
in-depth analysis of how malware uses TLS, and shows how
data features from passive monitoring of TLS can be used for
accurate malware identification and family attribution.
VIII. LIMITATIONS AND FUTURE WORK
Our method for collecting malware data was straightfor-
ward and allowed us to quickly generate a large volume of
network data, but the dependence on Windows XP and 5
minute runs introduced some biases in our presented results.
We accounted for these biases by specifically considering the
cases in which the TLS features reflected the operating system
and not the malware, and either analyzing the data with those
cases removed, or clearly labeling and analyzing those cases
otherwise. Accounting for the bias caused by the sandbox was
essential to understanding the actual malware use of TLS.
From a practitioners point of view, however, it is sometimes
worthwhile to consider the raw, biased data. Malware often
targets obsolete and unpatched software because it is vulnera-
ble, and thus it is biased in the same direction as the sandbox.
We leave running these samples under multiple environments
and collecting the additional results for future work.
After family names were associated with our malware
samples, the original set of 20,548 samples that used TLS was
reduced to a set of 5,623 unique samples across 18 families.
It is difficult to reliably determine the family, if any, asso-
ciated with a malware sample, even in a structured sandbox
setting. While our multi-class, malware family classifier can
reasonably be criticized for failing to provide attribution for
∼3/4 of the malware samples, this fact reflects the difficulty
of family attribution in a dynamic analysis environment, and
not a limitation of the underlying approach. In future work,
the malware families for the training data can be determined
by a robust clustering algorithm [5] instead of relying on a
consensus vote from VirusTotal [2].
Like nearly all other methods of threat detection, a moti-
vated threat actor could attempt to evade detection by mim-
icking the features of enterprise traffic. For instance, in our
case, this could take the form of attempting to offer the
same TLS parameters as a popular Firefox browser and
using a certificate issued by a reputable certificate authority.
But, while evasion is always possible in principle, in practice
it poses challenges for the malware operator. Mimicking a
13
popular HTTPS client implementation requires an ongoing
and non-trivial software engineering effort; if a client offers
a TLS ciphersuite or extension that it cannot actually support,
the session is unlikely to complete. On the server side, the
certificate must mimic the issuer, subjectAltName, time of
issuance, and validity period of the benign server. In either
case, the detection methods outlined in this paper are not meant
to be exhaustive, and in a robust system, these methods would
only be one facet of the final solution. An example of extending
this methodology for robustness would be to build a profile for
an endpoint based on the user-agent string advertised in
the unencrypted HTTP flows. If the TLS parameters indicate
a user agent that has not been observed on an endpoint, this
could be an interesting indicator of compromise.
All of the classification results presented in this paper
used 10-fold cross-validation and l1-logistic regression. We
have found this classifier to be very efficient and to perform
extremely well for network data feature classification. This
model reports a probabilistic output, allowing one to easily
change the threshold of the classifier. We did compare l1-
logistic regression with a support vector machine (Gaussian
kernel, width adjusted through CV), and found no statistically-
significant improvement using a 10-fold paired t-test at a 5%
significance level [15]. Because of the added computational
resources needed to train the SVM and the chosen model’s
robustness against overfitting [38], we only reported the l1-
logistic regression results. We leave examining alternative
models and quantifying their advantages for future work.
IX. CONCLUSIONS
Understanding malware’s use of TLS is imperative for
developing appropriate techniques to identify threats and re-
spond to those threats accordingly. In this paper, we reviewed
what TLS parameters malware typically uses from both the
perspective of the TLS client and the TLS servers that the
samples communicated with. Even when we accounted for the
bias caused by the underlying sandbox’s operating system,
we found that malware generally offers and selects weak
ciphersuites and does not offer the variety of extensions that
we see in enterprise clients.
We also analyzed the TLS usage of malware on a per family
basis. We identified malware families that are most likely
to use TLS client parameters that matched the TLS library
provided by Windows XP, the underlying operating system of
the sandbox, e.g., Bergat and Yakes; malware families that use
TLS client parameters that matched the TLS library provided
by the underlying operating system in addition to hundreds of
other TLS client configurations, e.g., Sality; and families that
exclusively used TLS client configurations that do not match
the TLS libraries supplied by the underlying operating system,
e.g., Virlock. As anticipated, we found that families who
actively evolve their usage of TLS are more difficult to classify.
We also found a malware family that used TLS parameters
that are similar to those found on an enterprise network, and
was difficult to classify: Dridex. But, if we leverage additional,
domain-specific knowledge such as whether the TLS certificate
was self-signed, we can significantly increase the performance
of our classifiers.
We showed that the differences in how malware families
use TLS can be used to attribute malicious, encrypted network
flows to a specific malware family. We also observed some
malware families using TLS in exactly the same way, e.g.,
Yakes and Kazy, which most often offered an ordered cipher-
suite list that matched a list found in the default Windows XP
SChannel implementation. We demonstrated an accuracy of
90.3% for the family attribution problem when restricted to
a single, encrypted flow, and an accuracy of 93.2% when we
made use of all encrypted flows within a 5-minute window.
We conclude that data features that are passively observed
in TLS provide information about both the client and server
software and its configuration. This data can be used to detect
malware and perform family attribution, either through rules
or classifiers. Malware’s TLS data features obtained from
sandboxes are biased, and it is essential to understand and
account for this bias when using these features
REFERENCES
[1] Most Internet Traffic will be Encrypted by Year End. Here’s
Why. http://fortune.com/2015/04/30/netflix-internet-traffic-
encrypted/,
accessed: 2016-03-23
[2] Virus Total. https://www.virustotal.com/ (2016)
[3] Zeus Source Code. https://github.com/Visgean/Zeus (2016)
[4] Adrian, D., Bhargavan, K., Durumeric, Z., Gaudry, P.,
Green, M.,
Halderman, J.A., Heninger, N., Springall, D., Thomé, E.,
Valenta,
L., VanderSloot, B., Wustrow, E., Zanella-Béguelin, S.,
Zimmermann,
P.: Imperfect Forward Secrecy: How Diffie-Hellman Fails in
Practice.
In: Proceedings of the Conference on Computer and
Communications
Security (CCS) (2015)
[5] Anderson, B., Storlie, C., Lane, T.: Multiple Kernel
Learning Clustering
with an Application to Malware. In: 12th International
Conference on
Data Mining (ICDM). pp. 804–809. IEEE (2012)
[6] Antonakakis, M., Perdisci, R., Nadji, Y., Vasiloglou, N.,
Abu-Nimeh,
S., Lee, W., Dagon, D.: From Throw-Away Traffic to Bots:
Detecting
the Rise of DGA-Based Malware. In: USENIX Security
Symposium.
pp. 491–506 (2012)
[7] Bayer, U., Comparetti, P.M., Hlauschek, C., Kruegel, C.,
Kirda, E.:
Scalable, Behavior-Based Malware Clustering. In: Proceedings
of the
Network and Distributed System Security Symposium (NDSS).
vol. 9,
pp. 8–11. Citeseer (2009)
[8] Bilge, L., Balzarotti, D., Robertson, W., Kirda, E., Kruegel,
C.: Disclo-
sure: Detecting Botnet Command and Control Servers through
Large-
Scale NetFlow Analysis. In: Proceedings of the 28th Annual
Computer
Security Applications Conference. pp. 129–138. ACM (2012)
[9] Callegati, F., Cerroni, W., Ramilli, M.: Man-in-the-Middle
Attack to the
HTTPS Protocol. IEEE Security & Privacy 7(1), 78–81 (2009)
[10] Cisco Talos: IP Blacklist Feed.
http://www.talosintel.com/feeds/ip-filter.
blf (2016)
[11] Claise, B.: Cisco Systems NetFlow Services Export
Version 9 (2013),
RFC 3954
[12] Claise, B., Trammell, B., Aitken, P.: Specification of the
IP Flow Infor-
mation Export (IPFIX) Protocol for the Exchange of Flow
Information
(2013), RFC 7011
[13] Dierks, T., Rescorla, E.: The Transport Layer Security
(TLS) Protocol
Version 1.2 (2008), RFC 5246
[14] Dietrich, C.J., Rossow, C., Pohlmann, N.: Cocospot:
Clustering and
Recognizing Botnet Command and Control Channels using
Traffic
Analysis. Computer Networks 57(2), 475–486 (2013)
[15] Dietterich, T.G.: Approximate Statistical Tests for
Comparing Super-
vised Classification Learning Algorithms. Neural computation
10(7)
(1998)
[16] Dietterich, T.G.: Ensemble Methods in Machine Learning.
In: Multiple
classifier systems, pp. 1–15. Springer (2000)
[17] Durumeric, Z., Wustrow, E., Halderman, J.A.: Zmap: Fast
Internet-
Wide Scanning and Its Security Applications. In: USENIX
Security
Symposium. pp. 605–620 (2013)
14
http://fortune.com/2015/04/30/netflix-internet-traffic-encrypted/
https://www.virustotal.com/
https://github.com/Visgean/Zeus
http://www.talosintel.com/feeds/ip-filter.blf
http://www.talosintel.com/feeds/ip-filter.blf
[18] Gu, G., Perdisci, R., Zhang, J., Lee, W.: BotMiner:
Clustering Analysis
of Network Traffic for Protocol-and Structure-Independent
Botnet De-
tection. In: USENIX Security Symposium. vol. 5, pp. 139–154
(2008)
[19] Holz, R., Amann, J., Mehani, O., Wachs, M., Kaafar, M.A.:
TLS in the
Wild: an Internet-Wide Analysis of TLS-Based Protocols for
Electronic
Communication. In: Proceedings of the Network and Distributed
System
Security Symposium (NDSS) (2016)
[20] Koh, K., Kim, S.J., Boyd, S.P.: An Interior-Point Method
for Large-
Scale l1-Regularized Logistic Regression. Journal of Machine
Learning
Research 8(8), 1519–1555 (2007)
[21] Krishnapuram, B., Carin, L., Figueiredo, M.A., Hartemink,
A.J.: Sparse
Multinomial Logistic Regression: Fast Algorithms and
Generalization
Bounds. Pattern Analysis and Machine Intelligence, IEEE
Transactions
on 27(6), 957–968 (2005)
[22] Microsoft: Choose the right ciphersuites in SChannel.
https://www.ssl.
com/how-to/choose-the-right-cipher-suites-in-schannel-dll/
(2016)
[23] Microsoft: SChannel. https://msdn.microsoft.com/en-
us/library/
windows/desktop/ms678421%28v=vs.85%29.aspx (2016)
[24] Moore, A.W., Zuev, D.: Internet Traffic Classification
Using Bayesian
Analysis Techniques. In: ACM SIGMETRICS Performance
Evaluation
Review. vol. 33, pp. 50–60. ACM (2005)
[25] Nguyen, T.T., Armitage, G.: A Survey of Techniques for
Internet Traffic
Classification using Machine Learning. Communications
Surveys &
Tutorials, IEEE 10(4), 56–76 (2008)
[26] Opderbeck, D.W., Hurwitz, J.G.: Apple v. FBI: Brief in
Support of
Neither Party in San Bernardino iPhone case.
http://ssrn.com/abstract=
2746100 (2016)
[27] Panchenko, A., Lanze, F., Zinnen, A., Henze, M.,
Pennekamp, J.,
Wehrle, K., Engel, T.: Website Fingerprinting at Internet Scale.
In: Pro-
ceedings of the Network and Distributed System Security
Symposium
(NDSS) (2016)
[28] Perdisci, R., Lee, W., Feamster, N.: Behavioral Clustering
of HTTP-
Based Malware and Signature Generation using Malicious
Network
Traces. In: NSDI. pp. 391–404 (2010)
[29] Qualys: Qualys SSL Labs.
https://www.ssllabs.com/ssltest/clients.html
(2016)
[30] Rieck, K., Holz, T., Willems, C., Düssel, P., Laskov, P.:
Learning and
Classification of Malware Behavior. In: Detection of Intrusions
and
Malware, and Vulnerability Assessment, pp. 108–125. Springer
(2008)
[31] Roesch, M.: Snort - Lightweight Intrusion Detection for
Networks. In:
Proceedings of the 13th USENIX Conference on System
Administra-
tion. pp. 229–238. LISA, USENIX Association (1999)
[32] Snort: Community Rules.
https://www.snort.org/downloads/community/
community-rules.tar.gz (2016)
[33] Vassilev, A.: Annex A: Approved Security Functions for
FIPS PUB
140-2, Security Requirements for Cryptographic Modules.
http://csrc.
nist.gov/publications/fips/fips140-2/fips1402annexa.pdf (2016)
[34] Wang, K., Cretu, G., Stolfo, S.J.: Anomalous Payload-
Based Worm
Detection and Signature Generation. In: Recent Advances in
Intrusion
Detection. pp. 227–246. Springer (2006)
[35] Wang, L., Dyer, K.P., Akella, A., Ristenpart, T.,
Shrimpton, T.: Seeing
through Network-Protocol Obfuscation. In: Proceedings of the
Confer-
ence on Computer and Communications Security (CCS). pp. 57–
69.
ACM (2015)
[36] Williams, N., Zander, S., Armitage, G.: A Preliminary
Performance
Comparison of Five Machine Learning Algorithms for Practical
IP Traf-
fic Flow Classification. Computer Communication Review 30
(2006)
[37] Wurzinger, P., Bilge, L., Holz, T., Goebel, J., Kruegel, C.,
Kirda, E.:
Automatically Generating Models for Botnet Detection. In:
Computer
Security–ESORICS 2009, pp. 232–249. Springer (2009)
[38] Yuan, G.X., Ho, C.H., Lin, C.J.: An Improved GLMNET
for L1-
Regularized Logistic Regression. Journal of Machine Learning
Research
13(Jun), 1999–2030 (2012)
[39] Zander, S., Nguyen, T., Armitage, G.: Automated Traffic
Classification
and Application Identification using Machine Learning. In: The
30th
IEEE Conference on Local Computer Networks. pp. 250–257.
IEEE
(2005)
APPENDIX A
CIPHERSUITE AND EXTENSION HEX CODES
Hex Code Ciphersuite
0x0004 TLS_RSA_WITH_RC4_128_MD5
0x0005 TLS_RSA_WITH_RC4_128_SHA
0x000a TLS_RSA_WITH_3DES_EDE_CBC_SHA
0x002f TLS_RSA_WITH_AES_128_CBC_SHA
0x0033 TLS_DHE_RSA_WITH_AES_128_CBC_SHA
0x0035 TLS_RSA_WITH_AES_256_CBC_SHA
0x0039 TLS_DHE_RSA_WITH_AES_256_CBC_SHA
0x003c TLS_RSA_WITH_AES_128_CBC_SHA256
0x003d TLS_RSA_WITH_AES_256_CBC_SHA256
0x0067 TLS_DHE_RSA_WITH_AES_128_CBC_
SHA256
0x006b TLS_DHE_RSA_WITH_AES_256_CBC_
SHA256
0x00fd unassigned
0xc009 TLS_ECDHE_ECDSA_WITH_AES_128_CBC_
SHA
0xc00a TLS_ECDHE_ECDSA_WITH_AES_256_CBC_
SHA
0xc013 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
0xc014 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
0xc02b TLS_ECDHE_ECDSA_WITH_AES_128_GCM_
SHA256
0xc02f TLS_ECDHE_RSA_WITH_AES_128_GCM_
SHA256
0xc030 TLS_ECDHE_RSA_WITH_AES_256_GCM_
SHA384
TABLE VII: Hex code to ciphersuite mapping for ciphersuites
used in figures.
Hex Code Ciphersuite
0x0000 server_name
0x0005 status_request
0x000a supported_groups
0x000b ec_point_formats
0x000d signature_algorithms
0x000f heartbeat
0x0010 application_layer_protocol_
negotiation
0x0012 signed_certificate_timestamp
0x0015 padding
0x0017 extended_master_secret
0x0023 SessionTicket TLS
0x3374 next_protocol_negotiation
0x7550 channel_id
0xff01 renegotiation_info
TABLE VIII: Hex code to extension mapping for extensions
used in figures.
15
https://www.ssl.com/how-to/choose-the-right-cipher-suites-in-
schannel-dll/
https://www.ssl.com/how-to/choose-the-right-cipher-suites-in-
schannel-dll/
https://msdn.microsoft.com/en-
us/library/windows/desktop/ms678421%28v=vs.85%29.aspx
https://msdn.microsoft.com/en-
us/library/windows/desktop/ms678421%28v=vs.85%29.aspx
http://ssrn.com/abstract=2746100
http://ssrn.com/abstract=2746100
https://www.ssllabs.com/ssltest/clients.html
https://www.snort.org/downloads/community/community-
rules.tar.gz
https://www.snort.org/downloads/community/community-
rules.tar.gz
http://csrc.nist.gov/publications/fips/fips140-
2/fips1402annexa.pdf
http://csrc.nist.gov/publications/fips/fips140-
2/fips1402annexa.pdfI IntroductionII Preliminaries and
AssumptionsIII DataIII-A Dataset and Sample SelectionIII-B
Feature ExtractionIII-B1 Flow MetadataIII-B2 Sequence of
Packet Lengths and Times.III-B3 Byte Distribution.III-B4
Unencrypted TLS Header Information.IV Malware Families and
TLSIV-A TLS ClientsIV-A1 Malware versus EnterpriseIV-A2
Malware FamiliesIV-B TLS ServersIV-B1 Malware versus
EnterpriseIV-B2 Malware FamiliesV Classifying Encrypted
TrafficV-A Malware versus EnterpriseV-B Malware FamiliesVI
Family AttributionVI-A Similar TLS UsageVI-B Multi-Class
ClassificationVII Related WorkVIII Limitations and Future
WorkIX ConclusionsReferencesAppendix A: Ciphersuite and
Extension Hex Codes
Running head: Discussion #1: The Essentials of Master's
Educations in Nursing 1
Discussion #1: The Essentials of Master's Educations in Nursing
2
Discussion #1: The Essentials of Master's Educations in Nursing
Jenny Jauregui
Florida National University
Nursing Research
Dr. Hirigoyen Jorge
January 14, 2019
The Essentials of Master's Educations in Nursing
For Master's nursing students, it is crucial to follow and
integrate the essentials described on The Essentials of Master's
Educations in Nursing to face the continuous changes in the
health environment; including changes related with knowledge,
technology, diversity, and globalization. These essentials
provide Master’s students with a complete understanding of the
discipline of nursing, allowing the graduates from the program
to be involved in an advanced level practice, be leaders in a
diversity of sceneries and commit to lifelong learning (AACN,
2011, p. 4). According to the information described in The
Essential of Master's in Nursing the essentials define the
knowledge and skills that all graduates from the nurse
practitioner program should acquire "to lead changes, promote
health, and elevate care in diverse roles and settings" (AACN,
2011, p. 3). There are nine essentials among The Essentials of
Master's Education in Nursing, and I selected the essential IV:
"Translating and Integrating Scholarship into Practice" to
analyze its crucial importance in students’ success in the
Master's Nursing Programs.
Since nursing is a profession that bases all its work in the
practice, "it is critical that clinical practice be based on
scientific knowledge" (Cherry & Jacob, 2014, p. 89). One of the
most vital elements that make up the scientific knowledge for
nursing practices is research, because it helps authenticate and
improve existing knowledge and make discoveries (Cherry &
Jacob, 2014, p. 89). It is essential that nurses always try to find
the correct rationale behind existing methods, ideas, and
traditions in the nursing field and use evidence into practice.
The Translating and Integrating Scholarship into Practice allows
the program graduates to develop essential skills like
knowledge, acquisition and dissemination, team working, and
change management to apply the existent evidence-based
practice in their daily work at the time of delivering care
(AACN, 2011, p. 16).
There is not doubt that this essential is a valuable resource
that helps the formation of Nurse Practitioners as successful
professionals who are able to provide the best interventions and
the best nursing care based in translation and integration of the
scholarship into practice.
De otra estudiante
Concerning the selection of one of the essentials and expanding
on it, I settled for essential VIII – clinical prevention and
population health for improving health. A master’s program of
nursing designed to achieve this essential should equip the
learners with the knowledge and skills to efficiently and
effectively plan, deliver, manage and evaluate evidence-based
clinical prevention and population care and services to
individuals and families among other targeted populations
(American Association of Colleges of Nursing, 2011). The
learner at FNU, upon completion of the program, should deliver
a client-centered, broad or organizational care that is also
culturally appropriate. The program, therefore, ensures learners
are adequately prepared to take upon inter-disciplinary care
roles and be excellent patient-educators by building on their
communication skills which is essential for proper diagnosis
and treatment.
Mis ideas del tema
Relating to Essential VIII that you discussed in your post: I
want to add that Health System in the U.S has been suffered
considerable changes during the last years like health disparities
and increase in population diversity. For that reason, it is
essential that graduates from the master’s program develop
skills and knowledge that allow them to provide care and
services that are equitable an responsive to the unique cultural
and ethnic identity, socio-economic conditions, emotional and
spiritual needs, and values of the patient and population
(AACN, 2011, p. 24)
Mis ideas de Essential IX
I agree with your post. I think It will be a long way to get to
the last step of the phases that completes the nursing program:
Essential IX “Master’s Level Nursing Practice.” However, it
will be gratifying. In the last phase, we will be able to fully
understand the foundations of care and the art of nursing
practice as well as nursing theories. We will be able to
implement safe quality care in different environments and roles
(AACN, 2011, p. 26). We will also have the capacity to
integrate concepts related to “quality improvement, patient
safety, economics of health care, environmental sciences,
epidemiology, genetics/genomics, gerontology, global health
care environment and perspective, health policy, informatics,
organization and systems, communication, negotiation,
advocacy, and interprofessional practice “ (AACN, 2011, p. 26).
The essential IX includes the practice-focused outcomes that
have in account the realities of the health care in our days that
are influenced by the faster changes in technology, and
globalization. The learning experience based in a variety of
settings, a deeper understanding of the nursing profession based
on reflective practice, the lifelong learning and professional
development (AACN, 2011, p. 26) are going to add valuable
knowledge to our prior experience as nurses. At that point of
the Master’s level we are going to be able to influences health
care outcomes for individuals, populations, or systems.
Idea de otro estudiante sobre ssential IX
I believe that this essential is the outcome or final
point that a Master’s students need to reach in order to be
capable of leading changes, promote health and elevate care in
various roles and settings (AACN, 2011, p. 3)
ssential IX: Master’s-Level Nursing Practice: It is described as
the final step or the phase that completes the program. At this
level is expected for the nurse to be able to influence
individually, wider populations, or institutions or systems
through conscious intervention. It is expected a broad
knowledge and understanding of the Science of Nursing
considering the acquired experience that made possible the
nurse to get to this level, and the experience acquired by the
systematic practice. It is at this level when the nurse gets
prepare to understand that the learning experience creates the
basis for the nurse to accomplish the nursing role and deliver
excellent care to families, populations, and individuals. These
experiences will be a compliment beyond the acquired
experiences in other nursing programs.
References
AACN. (2011, March 21). The Essentials of Master's Education
in Nursing. Retrieved from https://fnu.blackboard.com.
Cherry B. & Jacob S. (2014). Contemporary Nursing Issues,
Trends and Management. (6th, Ed.) St. Louis: Elsevier Mosby.

More Related Content

Similar to Deciphering Malware’s use of TLS (withoutDecryption)Blak.docx

Network security monitoring elastic webinar - 16 june 2021
Network security monitoring   elastic webinar - 16 june 2021Network security monitoring   elastic webinar - 16 june 2021
Network security monitoring elastic webinar - 16 june 2021Mouaz Alnouri
 
Mattias eriksson
Mattias erikssonMattias eriksson
Mattias erikssonHai Nguyen
 
Cloud Computing Assignment 3
Cloud Computing Assignment 3Cloud Computing Assignment 3
Cloud Computing Assignment 3Gurpreet singh
 
CTO-CybersecurityForum-2010-RonWilliams
CTO-CybersecurityForum-2010-RonWilliamsCTO-CybersecurityForum-2010-RonWilliams
CTO-CybersecurityForum-2010-RonWilliamssegughana
 
TechWiseTV Workshop: Encrypted Traffic Analytics
TechWiseTV Workshop: Encrypted Traffic Analytics TechWiseTV Workshop: Encrypted Traffic Analytics
TechWiseTV Workshop: Encrypted Traffic Analytics Robb Boyd
 
XML Encryption and Signature for Securing Web Services
XML Encryption and Signature for Securing Web ServicesXML Encryption and Signature for Securing Web Services
XML Encryption and Signature for Securing Web ServicesAIRCC Publishing Corporation
 
XML ENCRYPTION AND SIGNATURE FOR SECURING WEB SERVICES
XML ENCRYPTION AND SIGNATURE FOR SECURING WEB SERVICESXML ENCRYPTION AND SIGNATURE FOR SECURING WEB SERVICES
XML ENCRYPTION AND SIGNATURE FOR SECURING WEB SERVICESijcsit
 
XML Encryption and Signature for Securing Web Services
XML Encryption and Signature for Securing Web ServicesXML Encryption and Signature for Securing Web Services
XML Encryption and Signature for Securing Web ServicesCSEIJJournal
 
A network behavior analysis method to detect this writes about a method to ...
A network behavior analysis method to detect   this writes about a method to ...A network behavior analysis method to detect   this writes about a method to ...
A network behavior analysis method to detect this writes about a method to ...Thang Nguyen
 
VULNERABILITIES OF THE SSL/TLS PROTOCOL
VULNERABILITIES OF THE SSL/TLS PROTOCOLVULNERABILITIES OF THE SSL/TLS PROTOCOL
VULNERABILITIES OF THE SSL/TLS PROTOCOLcscpconf
 
Vulnerabilities of the SSL/TLS Protocol
Vulnerabilities of the SSL/TLS ProtocolVulnerabilities of the SSL/TLS Protocol
Vulnerabilities of the SSL/TLS Protocolcsandit
 
Detection of application layer ddos attack using hidden semi markov model (20...
Detection of application layer ddos attack using hidden semi markov model (20...Detection of application layer ddos attack using hidden semi markov model (20...
Detection of application layer ddos attack using hidden semi markov model (20...Mumbai Academisc
 
Effectual Routine for Trilateral Authentication in Ad-hoc Networks using Mult...
Effectual Routine for Trilateral Authentication in Ad-hoc Networks using Mult...Effectual Routine for Trilateral Authentication in Ad-hoc Networks using Mult...
Effectual Routine for Trilateral Authentication in Ad-hoc Networks using Mult...IOSR Journals
 
TAM new report
TAM new reportTAM new report
TAM new reportSuzit Punk
 
a probabilistic misbehavior detection scheme toward efficient trust establish...
a probabilistic misbehavior detection scheme toward efficient trust establish...a probabilistic misbehavior detection scheme toward efficient trust establish...
a probabilistic misbehavior detection scheme toward efficient trust establish...swathi78
 
Protecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperProtecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperShakas Technologies
 

Similar to Deciphering Malware’s use of TLS (withoutDecryption)Blak.docx (20)

What is TLS/SSL?
What is TLS/SSL? What is TLS/SSL?
What is TLS/SSL?
 
Network security monitoring elastic webinar - 16 june 2021
Network security monitoring   elastic webinar - 16 june 2021Network security monitoring   elastic webinar - 16 june 2021
Network security monitoring elastic webinar - 16 june 2021
 
Mattias eriksson
Mattias erikssonMattias eriksson
Mattias eriksson
 
Cloud Computing Assignment 3
Cloud Computing Assignment 3Cloud Computing Assignment 3
Cloud Computing Assignment 3
 
CTO-CybersecurityForum-2010-RonWilliams
CTO-CybersecurityForum-2010-RonWilliamsCTO-CybersecurityForum-2010-RonWilliams
CTO-CybersecurityForum-2010-RonWilliams
 
TechWiseTV Workshop: Encrypted Traffic Analytics
TechWiseTV Workshop: Encrypted Traffic Analytics TechWiseTV Workshop: Encrypted Traffic Analytics
TechWiseTV Workshop: Encrypted Traffic Analytics
 
XML Encryption and Signature for Securing Web Services
XML Encryption and Signature for Securing Web ServicesXML Encryption and Signature for Securing Web Services
XML Encryption and Signature for Securing Web Services
 
XML ENCRYPTION AND SIGNATURE FOR SECURING WEB SERVICES
XML ENCRYPTION AND SIGNATURE FOR SECURING WEB SERVICESXML ENCRYPTION AND SIGNATURE FOR SECURING WEB SERVICES
XML ENCRYPTION AND SIGNATURE FOR SECURING WEB SERVICES
 
XML Encryption and Signature for Securing Web Services
XML Encryption and Signature for Securing Web ServicesXML Encryption and Signature for Securing Web Services
XML Encryption and Signature for Securing Web Services
 
4777.team c.final
4777.team c.final4777.team c.final
4777.team c.final
 
Attack tor
Attack torAttack tor
Attack tor
 
A network behavior analysis method to detect this writes about a method to ...
A network behavior analysis method to detect   this writes about a method to ...A network behavior analysis method to detect   this writes about a method to ...
A network behavior analysis method to detect this writes about a method to ...
 
VULNERABILITIES OF THE SSL/TLS PROTOCOL
VULNERABILITIES OF THE SSL/TLS PROTOCOLVULNERABILITIES OF THE SSL/TLS PROTOCOL
VULNERABILITIES OF THE SSL/TLS PROTOCOL
 
Vulnerabilities of the SSL/TLS Protocol
Vulnerabilities of the SSL/TLS ProtocolVulnerabilities of the SSL/TLS Protocol
Vulnerabilities of the SSL/TLS Protocol
 
Banner grabbing
Banner grabbingBanner grabbing
Banner grabbing
 
Detection of application layer ddos attack using hidden semi markov model (20...
Detection of application layer ddos attack using hidden semi markov model (20...Detection of application layer ddos attack using hidden semi markov model (20...
Detection of application layer ddos attack using hidden semi markov model (20...
 
Effectual Routine for Trilateral Authentication in Ad-hoc Networks using Mult...
Effectual Routine for Trilateral Authentication in Ad-hoc Networks using Mult...Effectual Routine for Trilateral Authentication in Ad-hoc Networks using Mult...
Effectual Routine for Trilateral Authentication in Ad-hoc Networks using Mult...
 
TAM new report
TAM new reportTAM new report
TAM new report
 
a probabilistic misbehavior detection scheme toward efficient trust establish...
a probabilistic misbehavior detection scheme toward efficient trust establish...a probabilistic misbehavior detection scheme toward efficient trust establish...
a probabilistic misbehavior detection scheme toward efficient trust establish...
 
Protecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperProtecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropper
 

More from edwardmarivel

deadline 6 hours 7.3 y 7.47.4.docx
deadline  6 hours 7.3 y 7.47.4.docxdeadline  6 hours 7.3 y 7.47.4.docx
deadline 6 hours 7.3 y 7.47.4.docxedwardmarivel
 
Deadline 6 PM Friday September 27, 201310 Project Management Que.docx
Deadline 6 PM Friday September 27, 201310 Project Management Que.docxDeadline 6 PM Friday September 27, 201310 Project Management Que.docx
Deadline 6 PM Friday September 27, 201310 Project Management Que.docxedwardmarivel
 
DEADLINE 15 HOURS6 PAGES UNDERGRADUATECOURSEWORKHARV.docx
DEADLINE 15 HOURS6 PAGES UNDERGRADUATECOURSEWORKHARV.docxDEADLINE 15 HOURS6 PAGES UNDERGRADUATECOURSEWORKHARV.docx
DEADLINE 15 HOURS6 PAGES UNDERGRADUATECOURSEWORKHARV.docxedwardmarivel
 
De nada.El gusto es mío.Encantada.Me llamo Pepe.Muy bien, grac.docx
De nada.El gusto es mío.Encantada.Me llamo Pepe.Muy bien, grac.docxDe nada.El gusto es mío.Encantada.Me llamo Pepe.Muy bien, grac.docx
De nada.El gusto es mío.Encantada.Me llamo Pepe.Muy bien, grac.docxedwardmarivel
 
DDBA 8307 Week 4 Assignment TemplateJohn DoeDDBA 8.docx
DDBA 8307 Week 4 Assignment TemplateJohn DoeDDBA 8.docxDDBA 8307 Week 4 Assignment TemplateJohn DoeDDBA 8.docx
DDBA 8307 Week 4 Assignment TemplateJohn DoeDDBA 8.docxedwardmarivel
 
DDL 24 hours reading the article and writing a 1-page doubl.docx
DDL 24 hours reading the article and writing a 1-page doubl.docxDDL 24 hours reading the article and writing a 1-page doubl.docx
DDL 24 hours reading the article and writing a 1-page doubl.docxedwardmarivel
 
DCF valuation methodSuper-normal growth modelApplicatio.docx
DCF valuation methodSuper-normal growth modelApplicatio.docxDCF valuation methodSuper-normal growth modelApplicatio.docx
DCF valuation methodSuper-normal growth modelApplicatio.docxedwardmarivel
 
DDBA 8307 Week 2 Assignment ExemplarJohn Doe[footnoteRef1] .docx
DDBA 8307 Week 2 Assignment ExemplarJohn Doe[footnoteRef1] .docxDDBA 8307 Week 2 Assignment ExemplarJohn Doe[footnoteRef1] .docx
DDBA 8307 Week 2 Assignment ExemplarJohn Doe[footnoteRef1] .docxedwardmarivel
 
DBM380 v14Create a DatabaseDBM380 v14Page 2 of 2Create a D.docx
DBM380 v14Create a DatabaseDBM380 v14Page 2 of 2Create a D.docxDBM380 v14Create a DatabaseDBM380 v14Page 2 of 2Create a D.docx
DBM380 v14Create a DatabaseDBM380 v14Page 2 of 2Create a D.docxedwardmarivel
 
DBA CAPSTONE TEMPLATEThe pages in this template are correctl.docx
DBA CAPSTONE TEMPLATEThe pages in this template are correctl.docxDBA CAPSTONE TEMPLATEThe pages in this template are correctl.docx
DBA CAPSTONE TEMPLATEThe pages in this template are correctl.docxedwardmarivel
 
DB3.1 Mexico corruptionDiscuss the connection between pol.docx
DB3.1 Mexico corruptionDiscuss the connection between pol.docxDB3.1 Mexico corruptionDiscuss the connection between pol.docx
DB3.1 Mexico corruptionDiscuss the connection between pol.docxedwardmarivel
 
DB2Pepsi Co and Coke American beverage giants, must adhere to th.docx
DB2Pepsi Co and Coke American beverage giants, must adhere to th.docxDB2Pepsi Co and Coke American beverage giants, must adhere to th.docx
DB2Pepsi Co and Coke American beverage giants, must adhere to th.docxedwardmarivel
 
DB1 What Ive observedHave you ever experienced a self-managed .docx
DB1 What Ive observedHave you ever experienced a self-managed .docxDB1 What Ive observedHave you ever experienced a self-managed .docx
DB1 What Ive observedHave you ever experienced a self-managed .docxedwardmarivel
 
DB Response 1I agree with the decision to search the house. Ther.docx
DB Response 1I agree with the decision to search the house. Ther.docxDB Response 1I agree with the decision to search the house. Ther.docx
DB Response 1I agree with the decision to search the house. Ther.docxedwardmarivel
 
DB Response prompt ZAKChapter 7, Q1.Customers are expecting.docx
DB Response prompt  ZAKChapter 7, Q1.Customers are expecting.docxDB Response prompt  ZAKChapter 7, Q1.Customers are expecting.docx
DB Response prompt ZAKChapter 7, Q1.Customers are expecting.docxedwardmarivel
 
DB Topic of Discussion Information-related CapabilitiesAnalyze .docx
DB Topic of Discussion Information-related CapabilitiesAnalyze .docxDB Topic of Discussion Information-related CapabilitiesAnalyze .docx
DB Topic of Discussion Information-related CapabilitiesAnalyze .docxedwardmarivel
 
DB Instructions Each reply must be 250–300 words with a minim.docx
DB Instructions Each reply must be 250–300 words with a minim.docxDB Instructions Each reply must be 250–300 words with a minim.docx
DB Instructions Each reply must be 250–300 words with a minim.docxedwardmarivel
 
DB Defining White Collar CrimeHow would you define white co.docx
DB Defining White Collar CrimeHow would you define white co.docxDB Defining White Collar CrimeHow would you define white co.docx
DB Defining White Collar CrimeHow would you define white co.docxedwardmarivel
 
DAVID H. ROSENBLOOMSECOND EDITIONAdministrative Law .docx
DAVID H. ROSENBLOOMSECOND EDITIONAdministrative Law .docxDAVID H. ROSENBLOOMSECOND EDITIONAdministrative Law .docx
DAVID H. ROSENBLOOMSECOND EDITIONAdministrative Law .docxedwardmarivel
 

More from edwardmarivel (20)

deadline 6 hours 7.3 y 7.47.4.docx
deadline  6 hours 7.3 y 7.47.4.docxdeadline  6 hours 7.3 y 7.47.4.docx
deadline 6 hours 7.3 y 7.47.4.docx
 
Deadline 6 PM Friday September 27, 201310 Project Management Que.docx
Deadline 6 PM Friday September 27, 201310 Project Management Que.docxDeadline 6 PM Friday September 27, 201310 Project Management Que.docx
Deadline 6 PM Friday September 27, 201310 Project Management Que.docx
 
DEADLINE 15 HOURS6 PAGES UNDERGRADUATECOURSEWORKHARV.docx
DEADLINE 15 HOURS6 PAGES UNDERGRADUATECOURSEWORKHARV.docxDEADLINE 15 HOURS6 PAGES UNDERGRADUATECOURSEWORKHARV.docx
DEADLINE 15 HOURS6 PAGES UNDERGRADUATECOURSEWORKHARV.docx
 
De nada.El gusto es mío.Encantada.Me llamo Pepe.Muy bien, grac.docx
De nada.El gusto es mío.Encantada.Me llamo Pepe.Muy bien, grac.docxDe nada.El gusto es mío.Encantada.Me llamo Pepe.Muy bien, grac.docx
De nada.El gusto es mío.Encantada.Me llamo Pepe.Muy bien, grac.docx
 
DDBA 8307 Week 4 Assignment TemplateJohn DoeDDBA 8.docx
DDBA 8307 Week 4 Assignment TemplateJohn DoeDDBA 8.docxDDBA 8307 Week 4 Assignment TemplateJohn DoeDDBA 8.docx
DDBA 8307 Week 4 Assignment TemplateJohn DoeDDBA 8.docx
 
DDL 24 hours reading the article and writing a 1-page doubl.docx
DDL 24 hours reading the article and writing a 1-page doubl.docxDDL 24 hours reading the article and writing a 1-page doubl.docx
DDL 24 hours reading the article and writing a 1-page doubl.docx
 
DCF valuation methodSuper-normal growth modelApplicatio.docx
DCF valuation methodSuper-normal growth modelApplicatio.docxDCF valuation methodSuper-normal growth modelApplicatio.docx
DCF valuation methodSuper-normal growth modelApplicatio.docx
 
ddr-.docx
ddr-.docxddr-.docx
ddr-.docx
 
DDBA 8307 Week 2 Assignment ExemplarJohn Doe[footnoteRef1] .docx
DDBA 8307 Week 2 Assignment ExemplarJohn Doe[footnoteRef1] .docxDDBA 8307 Week 2 Assignment ExemplarJohn Doe[footnoteRef1] .docx
DDBA 8307 Week 2 Assignment ExemplarJohn Doe[footnoteRef1] .docx
 
DBM380 v14Create a DatabaseDBM380 v14Page 2 of 2Create a D.docx
DBM380 v14Create a DatabaseDBM380 v14Page 2 of 2Create a D.docxDBM380 v14Create a DatabaseDBM380 v14Page 2 of 2Create a D.docx
DBM380 v14Create a DatabaseDBM380 v14Page 2 of 2Create a D.docx
 
DBA CAPSTONE TEMPLATEThe pages in this template are correctl.docx
DBA CAPSTONE TEMPLATEThe pages in this template are correctl.docxDBA CAPSTONE TEMPLATEThe pages in this template are correctl.docx
DBA CAPSTONE TEMPLATEThe pages in this template are correctl.docx
 
DB3.1 Mexico corruptionDiscuss the connection between pol.docx
DB3.1 Mexico corruptionDiscuss the connection between pol.docxDB3.1 Mexico corruptionDiscuss the connection between pol.docx
DB3.1 Mexico corruptionDiscuss the connection between pol.docx
 
DB2Pepsi Co and Coke American beverage giants, must adhere to th.docx
DB2Pepsi Co and Coke American beverage giants, must adhere to th.docxDB2Pepsi Co and Coke American beverage giants, must adhere to th.docx
DB2Pepsi Co and Coke American beverage giants, must adhere to th.docx
 
DB1 What Ive observedHave you ever experienced a self-managed .docx
DB1 What Ive observedHave you ever experienced a self-managed .docxDB1 What Ive observedHave you ever experienced a self-managed .docx
DB1 What Ive observedHave you ever experienced a self-managed .docx
 
DB Response 1I agree with the decision to search the house. Ther.docx
DB Response 1I agree with the decision to search the house. Ther.docxDB Response 1I agree with the decision to search the house. Ther.docx
DB Response 1I agree with the decision to search the house. Ther.docx
 
DB Response prompt ZAKChapter 7, Q1.Customers are expecting.docx
DB Response prompt  ZAKChapter 7, Q1.Customers are expecting.docxDB Response prompt  ZAKChapter 7, Q1.Customers are expecting.docx
DB Response prompt ZAKChapter 7, Q1.Customers are expecting.docx
 
DB Topic of Discussion Information-related CapabilitiesAnalyze .docx
DB Topic of Discussion Information-related CapabilitiesAnalyze .docxDB Topic of Discussion Information-related CapabilitiesAnalyze .docx
DB Topic of Discussion Information-related CapabilitiesAnalyze .docx
 
DB Instructions Each reply must be 250–300 words with a minim.docx
DB Instructions Each reply must be 250–300 words with a minim.docxDB Instructions Each reply must be 250–300 words with a minim.docx
DB Instructions Each reply must be 250–300 words with a minim.docx
 
DB Defining White Collar CrimeHow would you define white co.docx
DB Defining White Collar CrimeHow would you define white co.docxDB Defining White Collar CrimeHow would you define white co.docx
DB Defining White Collar CrimeHow would you define white co.docx
 
DAVID H. ROSENBLOOMSECOND EDITIONAdministrative Law .docx
DAVID H. ROSENBLOOMSECOND EDITIONAdministrative Law .docxDAVID H. ROSENBLOOMSECOND EDITIONAdministrative Law .docx
DAVID H. ROSENBLOOMSECOND EDITIONAdministrative Law .docx
 

Recently uploaded

24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...Nguyen Thanh Tu Collection
 
e-Sealing at EADTU by Kamakshi Rajagopal
e-Sealing at EADTU by Kamakshi Rajagopale-Sealing at EADTU by Kamakshi Rajagopal
e-Sealing at EADTU by Kamakshi RajagopalEADTU
 
diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....Ritu480198
 
Dementia (Alzheimer & vasular dementia).
Dementia (Alzheimer & vasular dementia).Dementia (Alzheimer & vasular dementia).
Dementia (Alzheimer & vasular dementia).Mohamed Rizk Khodair
 
SPLICE Working Group: Reusable Code Examples
SPLICE Working Group:Reusable Code ExamplesSPLICE Working Group:Reusable Code Examples
SPLICE Working Group: Reusable Code ExamplesPeter Brusilovsky
 
ANTI PARKISON DRUGS.pptx
ANTI         PARKISON          DRUGS.pptxANTI         PARKISON          DRUGS.pptx
ANTI PARKISON DRUGS.pptxPoojaSen20
 
BỘ LUYỆN NGHE TIẾNG ANH 8 GLOBAL SUCCESS CẢ NĂM (GỒM 12 UNITS, MỖI UNIT GỒM 3...
BỘ LUYỆN NGHE TIẾNG ANH 8 GLOBAL SUCCESS CẢ NĂM (GỒM 12 UNITS, MỖI UNIT GỒM 3...BỘ LUYỆN NGHE TIẾNG ANH 8 GLOBAL SUCCESS CẢ NĂM (GỒM 12 UNITS, MỖI UNIT GỒM 3...
BỘ LUYỆN NGHE TIẾNG ANH 8 GLOBAL SUCCESS CẢ NĂM (GỒM 12 UNITS, MỖI UNIT GỒM 3...Nguyen Thanh Tu Collection
 
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading RoomSternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading RoomSean M. Fox
 
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...Nguyen Thanh Tu Collection
 
Andreas Schleicher presents at the launch of What does child empowerment mean...
Andreas Schleicher presents at the launch of What does child empowerment mean...Andreas Schleicher presents at the launch of What does child empowerment mean...
Andreas Schleicher presents at the launch of What does child empowerment mean...EduSkills OECD
 
Envelope of Discrepancy in Orthodontics: Enhancing Precision in Treatment
 Envelope of Discrepancy in Orthodontics: Enhancing Precision in Treatment Envelope of Discrepancy in Orthodontics: Enhancing Precision in Treatment
Envelope of Discrepancy in Orthodontics: Enhancing Precision in Treatmentsaipooja36
 
Basic Civil Engineering notes on Transportation Engineering, Modes of Transpo...
Basic Civil Engineering notes on Transportation Engineering, Modes of Transpo...Basic Civil Engineering notes on Transportation Engineering, Modes of Transpo...
Basic Civil Engineering notes on Transportation Engineering, Modes of Transpo...Denish Jangid
 
MSc Ag Genetics & Plant Breeding: Insights from Previous Year JNKVV Entrance ...
MSc Ag Genetics & Plant Breeding: Insights from Previous Year JNKVV Entrance ...MSc Ag Genetics & Plant Breeding: Insights from Previous Year JNKVV Entrance ...
MSc Ag Genetics & Plant Breeding: Insights from Previous Year JNKVV Entrance ...Krashi Coaching
 
philosophy and it's principles based on the life
philosophy and it's principles based on the lifephilosophy and it's principles based on the life
philosophy and it's principles based on the lifeNitinDeodare
 
The Story of Village Palampur Class 9 Free Study Material PDF
The Story of Village Palampur Class 9 Free Study Material PDFThe Story of Village Palampur Class 9 Free Study Material PDF
The Story of Village Palampur Class 9 Free Study Material PDFVivekanand Anglo Vedic Academy
 
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...Nguyen Thanh Tu Collection
 
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptxAnalyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptxLimon Prince
 
8 Tips for Effective Working Capital Management
8 Tips for Effective Working Capital Management8 Tips for Effective Working Capital Management
8 Tips for Effective Working Capital ManagementMBA Assignment Experts
 

Recently uploaded (20)

24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
 
e-Sealing at EADTU by Kamakshi Rajagopal
e-Sealing at EADTU by Kamakshi Rajagopale-Sealing at EADTU by Kamakshi Rajagopal
e-Sealing at EADTU by Kamakshi Rajagopal
 
diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....
 
Dementia (Alzheimer & vasular dementia).
Dementia (Alzheimer & vasular dementia).Dementia (Alzheimer & vasular dementia).
Dementia (Alzheimer & vasular dementia).
 
SPLICE Working Group: Reusable Code Examples
SPLICE Working Group:Reusable Code ExamplesSPLICE Working Group:Reusable Code Examples
SPLICE Working Group: Reusable Code Examples
 
ANTI PARKISON DRUGS.pptx
ANTI         PARKISON          DRUGS.pptxANTI         PARKISON          DRUGS.pptx
ANTI PARKISON DRUGS.pptx
 
BỘ LUYỆN NGHE TIẾNG ANH 8 GLOBAL SUCCESS CẢ NĂM (GỒM 12 UNITS, MỖI UNIT GỒM 3...
BỘ LUYỆN NGHE TIẾNG ANH 8 GLOBAL SUCCESS CẢ NĂM (GỒM 12 UNITS, MỖI UNIT GỒM 3...BỘ LUYỆN NGHE TIẾNG ANH 8 GLOBAL SUCCESS CẢ NĂM (GỒM 12 UNITS, MỖI UNIT GỒM 3...
BỘ LUYỆN NGHE TIẾNG ANH 8 GLOBAL SUCCESS CẢ NĂM (GỒM 12 UNITS, MỖI UNIT GỒM 3...
 
“O BEIJO” EM ARTE .
“O BEIJO” EM ARTE                       .“O BEIJO” EM ARTE                       .
“O BEIJO” EM ARTE .
 
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading RoomSternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
 
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
 
Andreas Schleicher presents at the launch of What does child empowerment mean...
Andreas Schleicher presents at the launch of What does child empowerment mean...Andreas Schleicher presents at the launch of What does child empowerment mean...
Andreas Schleicher presents at the launch of What does child empowerment mean...
 
Envelope of Discrepancy in Orthodontics: Enhancing Precision in Treatment
 Envelope of Discrepancy in Orthodontics: Enhancing Precision in Treatment Envelope of Discrepancy in Orthodontics: Enhancing Precision in Treatment
Envelope of Discrepancy in Orthodontics: Enhancing Precision in Treatment
 
Basic Civil Engineering notes on Transportation Engineering, Modes of Transpo...
Basic Civil Engineering notes on Transportation Engineering, Modes of Transpo...Basic Civil Engineering notes on Transportation Engineering, Modes of Transpo...
Basic Civil Engineering notes on Transportation Engineering, Modes of Transpo...
 
MSc Ag Genetics & Plant Breeding: Insights from Previous Year JNKVV Entrance ...
MSc Ag Genetics & Plant Breeding: Insights from Previous Year JNKVV Entrance ...MSc Ag Genetics & Plant Breeding: Insights from Previous Year JNKVV Entrance ...
MSc Ag Genetics & Plant Breeding: Insights from Previous Year JNKVV Entrance ...
 
philosophy and it's principles based on the life
philosophy and it's principles based on the lifephilosophy and it's principles based on the life
philosophy and it's principles based on the life
 
The Story of Village Palampur Class 9 Free Study Material PDF
The Story of Village Palampur Class 9 Free Study Material PDFThe Story of Village Palampur Class 9 Free Study Material PDF
The Story of Village Palampur Class 9 Free Study Material PDF
 
Including Mental Health Support in Project Delivery, 14 May.pdf
Including Mental Health Support in Project Delivery, 14 May.pdfIncluding Mental Health Support in Project Delivery, 14 May.pdf
Including Mental Health Support in Project Delivery, 14 May.pdf
 
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
 
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptxAnalyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
 
8 Tips for Effective Working Capital Management
8 Tips for Effective Working Capital Management8 Tips for Effective Working Capital Management
8 Tips for Effective Working Capital Management
 

Deciphering Malware’s use of TLS (withoutDecryption)Blak.docx

  • 1. Deciphering Malware’s use of TLS (without Decryption) Blake Anderson Cisco [email protected] Subharthi Paul Cisco [email protected] David McGrew Cisco [email protected] Abstract—The use of TLS by malware poses new challenges to network threat detection because traditional pattern-matching techniques can no longer be applied to its messages. However, TLS also introduces a complex set of observable data features that allow many inferences to be made about both the client and the server. We show that these features can be used to detect and understand malware communication, while at the same time preserving the privacy of benign uses of encryption. These data features also allow for accurate malware family attribution of network communication, even when restricted to a single, encrypted flow. To demonstrate this, we performed a detailed study of how TLS is used by malware and enterprise applications. We provide a general analysis on millions of TLS encrypted flows, and a targeted study on 18 malware families composed of thousands
  • 2. of unique malware samples and ten-of-thousands of malicious TLS flows. Importantly, we identify and accommodate the bias introduced by the use of a malware sandbox. The performance of a malware classifier is correlated with a malware family’s use of TLS, i.e., malware families that actively evolve their use of cryptography are more difficult to classify. We conclude that malware’s usage of TLS is distinct from benign usage in an enterprise setting, and that these differences can be effectively used in rules and machine learning classifiers. I. INTRODUCTION Encryption is necessary to protect the privacy of end users. In a network setting, Transport Layer Security (TLS) is the dominant protocol to provide encryption for network traffic. While TLS obscures the plaintext, it also introduces a complex set of observable parameters that allow many inferences to be made about both the client and the server. Legitimate traffic has seen a rapid adoption of the TLS standard over the past decade, with some studies stating that as much as 60% of network traffic uses TLS [1]. Unfortunately, malware has also adopted TLS to secure its communication. In our dataset, ∼10% of the malware samples use TLS. This trend makes threat detection more difficult because it renders the use of deep packet inspection (DPI) ineffective. It is important to determine whether encrypted network traffic is benign or malicious, and do so in a way that preserves the integrity of the encryption. And while 10% of malware samples utilizing TLS seems low, we make the assumption that this number will increase as the level of encryption in network traffic increases. Along these lines, we have seen a slight, but statistically significant, increase in malicious, encrypted traffic over the
  • 3. past 12 months. To further motivate the need for a study exposing mal- ware’s use of TLS, we consider the limitations of a pattern- matching approach when faced with TLS, and analyzed a popular community Intrusion Protection System (IPS) rule set [32]. As of this writing, there were 3,437 rules in that set, 3,307 of which inspect packet contents. Only 48 rules were TLS specific, and of those, only 6 detected malware, using strings in self-signed certificates. Of the remainder, 19 detect Heartbleed or other overflow attacks against TLS implemen- tations, and 23 detect plaintext over ports typically assigned to TLS. These numbers show that traditional signature-based techniques have not heavily invested in TLS-specific malware signatures to date. However, the rules that match certificate strings hint that it is possible to detect malware through the passive inspection of TLS. Our goal in this paper to confirm and substantiate this idea, by identifying data features and illustrating methodologies that allow for the creation of rules and machine learning classifiers that can detect malicious, encrypted network communication. For instance, we identify features of both the TLS client and server gathered from unencrypted handshake messages that could be used to create IPS rules. In this paper, we provide a comprehensive study of mal- ware’s use of TLS by observing the unencrypted TLS hand- shake messages. We give a high-level overview of malware’s use of TLS compared to what we have observed on an enterprise network. Enterprise traffic typically uses up-to-date cryptographic parameters that are indicative of up-to-date TLS libraries. On the other hand, malware typically uses older and weaker cryptographic parameters. Malware’s usage of TLS is distinct compared to enterprise traffic, and, for most families, this fact can be leveraged to accurately classify malicious traffic patterns. We examine these difference from both a TLS
  • 4. client and a TLS server perspective. In addition to our in-depth technical analysis, it is inter- esting to note the general tone that malware authors have towards encryption. There is an FAQ section in the open- sourced Zeus/Zbot malware [3] where the following question and answer occur (content left as is): Question: Why traffic is encrypted with symmetric encryption method (RC4), but not asymmetric (RSA)? Answer: Because, in the use of sophisticated algorithms it makes no sense, encryption only needs to hide traffic. In the current privacy climate, this attitude most certainly does not hold for enterprise network traffic [4], [26]. Again, this ar X iv :1 60 7. 01 63 9v 1 [ cs .C
  • 5. R ] 6 J ul 2 01 6 divergence is another tool we can take advantage of to more accurately classify malicious flows. When applying machine learning classifiers on a per-family basis, it is clear that some families/subfamilies are more difficult to classify. Our goal is not to show optimized machine learning classifiers, but rather to identify what characteristics of the specific family make it difficult to classify. For instance, we can correlate poor classifier performance on encrypted traffic patterns with one family’s use of strong [33] and varied cryptography. We also examine additional features extracted from unencrypted TLS handshake messages that significantly increase the performance of the classifiers. In general, we have found this approach to be fruitful: identify weaknesses in the features used to represent a flow on a per-family basis, and then augment that representation with more informative features. Finally, we show how we can perform family attribution given only network based data. This problem is positioned as a multi-class classification problem where each malware family has its own label. We identify families who use identical TLS
  • 6. parameters, but can still be accurately classified because their traffic patterns with respect to other flow-based features are distinct. We also identify subfamilies of malware that cannot be distinguished from one another with only their network data. We are able to achieve an accuracy of 90.3% for the family attribution problem when restricted to a single, encrypted flow, and an accuracy of 93.2% when we make use of all encrypted flows within a 5-minute window. We use a commercial sandbox environment to collect the first five minutes of a malware sample’s network activity. We collected tens-of-thousands of unique malware samples and hundreds-of-thousands of malicious, encrypted flows from these samples. We collected millions of TLS encrypted flows from an enterprise network to compare against the malware data. We used an open source project to collect the data and transform it to a JSON format that contained the typical network 5-tuple, the sequence of packet lengths and inter- arrival times, the byte distribution, and the unencrypted TLS handshake information. All of the analysis done in this paper uses only network data, and does not assume an endpoint presence. The remainder of the paper is organized as follows: Section II outlines some basic assumptions we make with respect to the data and our methodology, and Section III reviews how we obtained our data, specifies the datasets we use for each experiment, and what features we use to classify the network flows. Section IV gives an overview of how malware’s usage of TLS differs from that of an enterprise network from both the perspective of a TLS client and a TLS server. Section V shows which families are difficult to classify from a network flow point-of-view, and explains why this is the case, and Section VI gives results showing how we can attribute a flow to a particular family. Section VII reviews previous and related work, Section VIII outlines some limitations of our approach,
  • 7. and finally, we conclude in Section IX. II. PRELIMINARIES AND ASSUMPTIONS Our primary concern in this paper is to categorize and classify malicious, TLS encrypted flows. While we do use the serverHello and certificate messages to highlight Port Percentage of TLS Flows 443 98.4% 9001 1.2% 80 0.1% 9101 0.1% 9002 0.1% TABLE I: Based on malware data collected between August 2015 and May 2016, we investigated which ports malware used the most for TLS Encrypted communication. some interesting features about the servers that the malware samples are connecting to, our main focus is client oriented. The classification algorithms we develop are heavily dependent on client-based features, which allows our algorithms to cor- rectly classify a malicious agent connecting to google.com versus a typical enterprise agent connecting to google.com, i.e., we can leverage the client’s cryptographic parameters to differentiate these two events. For this reason, we do not filter the malware’s TLS traffic to only include command and control flows, but also allow other types of TLS-encrypted traffic such as click-fraud. In this paper, we focus on TLS encrypted flows over port 443 to make the comparisons between enterprise TLS and malicious TLS be as unbiased as possible. To further motivate this choice, Table I lists the 5 most used ports for
  • 8. TLS by the malware samples collected between August 2015 and May 2016. To determine if a flow was TLS, we used deep packet inspection and a custom signature based on the TLS versions and message types of the clientHello and serverHello messages. In total, we found 229,364 TLS flows across 203 unique ports, and port 443 was by far the most common port for malicious TLS. Although the diversity of port usage in malware was great, these diverse ports were relatively uncommon. Given that our non-malware data was collected on an enterprise network, it naturally follows that the categorization and classification results presented in this paper are most applicable to the enterprise setting. We do not claim that these results hold for the general class of networks, e.g., service provider data. That being said, we do believe that securing enterprise networks is an important use case and that the conclusions presented in this paper offer enterprise network operators significantly novel and valuable results. The enterprise network data used in this paper was initially filtered using a well known IP blacklist [10]. This removed ∼0.05% of the initial traffic. After this filtering stage, we take the data “as-is”. We are aware that there is most likely more malicious traffic in this dataset, but this fact is just taken as a base assumption for reasons of practicality. III. DATA The data for this paper was collected from a commer- cial sandbox environment where users can submit suspicious executables. Each submitted sample is allowed to run for 5 minutes. The full packet capture is collected and stored for each sample. Due to constraints of the sandbox environment, 2
  • 9. Malware Family Unique Samples Encrypted Flows Bergat 192 332 Deshacop 69 129 Dridex 38 103 Dynamer 118 372 Kazy 228 1,152 Parite 111 275 Razy 117 564 Sality 612 1,200 Skeeyah 81 218 Symmi 494 2,618 Tescrypt 137 205 Toga 156 404 Upatre 377 891 Virlock 1,208 12,847 Virtob 115 511 Yakes 100 337 Zbot 1,291 2,902 Zusy 179 733 Total 5,623 25,793 TABLE II: Summary of the malicious families used in our analysis. We collected 18 malicious families, 5,623 malicious samples, and 25,793 encrypted flows that successfully negoti- ated the TLS handshake and sent application data. all network traffic observed in the sandbox is considered to be that of the originally submitted sample. For instance, if sample A downloads and installs B and C, then the traffic generated from B and C would be considered A’s.
  • 10. This method of data collection is straightforward, and while it ignores some details about what is occurring on the endpoint, it is consistent with our goal of understanding each sample based solely on its network communications. Some biases were introduced with this approach. First, to reduce the number of false positives, we only considered samples that were known bad. In this setting, known bad means hitting on four or more antivirus convictions from unique vendors in VirusTotal [2]. Second, due to hardware constraints, the samples are only allowed to run for 5 minutes in a Windows XP-based virtual machine. Any encrypted network traffic that happens after this initial 5 minute window will not be captured. Similarly, any samples that are not compatible with Windows XP will not run in this environment. The enterprise data was collected from an enterprise net- work with ∼500 active users and ∼4,000 unique IP addresses. The majority of the machines on this network run Windows 7, with the second most popular operating system being OS X El Capitan. A. Dataset and Sample Selection The malware traffic used in this paper was collected from August 2015 to May 2016, and the enterprise traffic was collected during a 4 day period in May 2016 and a 4 day period in June 2016. In this work, we performed several experiments on different subsets of this data. We first analyze the differences between the TLS pa- rameters typically seen on an enterprise network versus the TLS parameters used by the general malware population. To proceed, we first removed all of the TLS flows that offered an ordered ciphersuite list that matched a list found in the default Windows XP SChannel implementation [23]. This was done to help ensure that the TLS clients we observed
  • 11. were representative of the malware’s behavior and not that of the TLS library provided by the underlying operating system. This removed ∼40% of the malicious TLS flows and ∼0.4% of the enterprise TLS flows. After this filtering stage, we used all of the TLS flows in our dataset. From August 2015 until May 2016, we collected 133,744 TLS flows initiated by malicious programs. During the 4 day periods in May and June 2016, we collected 1,500,005 TLS flows from an enterprise network. All of these TLS flows successfully negotiated the full TLS handshake and sent application data. To analyze the differences between the TLS parameters used by different malware families, we used the malware sam- ples from October 2015 to May 2016 that had an identifiable family name. Table II gives a summary of the number of samples and flows for each malware family. The family name was generated by a majority vote from the signatures provided by VirusTotal [2]. Malware samples without a clear family name were discarded, i.e., any sample without at least four different antivirus programs using the same name (ignoring common names such as Trojan). Family names with less than 100 flows were not used. This process pruned our original set of 20,548 samples that used TLS to 5,623 unique samples across 18 families. It is difficult to determine the family, if any, associated with a malware sample, even with the information provided through dynamic analysis in a sandbox setting. These samples generated 25,793 TLS encrypted flows that success- fully negotiated the TLS handshake and sent application data. In this paper, we also make use of machine learning classifiers in three experiments. The first is to demonstrate the value of the additional TLS features through 10-fold cross- validation. For this experiment, we use all of the malicious TLS flows collected from August 2015 until May 2016, and a random subset of the May and June 2016 enterprise network’s TLS flows. In total, there were 225,740 malicious and 225,000
  • 12. enterprise flows for this experiment. To account for the bias that the Windows XP-based sandbox could introduce, we also present results on a dataset composed of only flows that offered an ordered ciphersuite list that did not match a list found in the default Windows XP SChannel implementation: 133,744 malicious and 135,000 enterprise TLS flows. In the next set of experiments, we analyzed how well a trained classifier is able to detect the TLS flows generated by the different malware families. To train the classifier, we used the same 225,000 enterprise flows as above for the negative class, and 76,760 malicious TLS flows collected during August and September 2015 for the positive class. The testing data consisted of the TLS flows from October 2015 to May 2016 that could be assigned a ground truth family as described above. Again, Table II gives a summary of the number of samples and flows for each malware family. While we do not remove flows that offered an ordered ciphersuite list that matched a list found in the default Windows XP SChannel implementation in this experiment, we do make explicit the 3 families that have this bias. Finally, to assess the malware family attribution potential of TLS handshake metadata, we used 10-fold cross-validation and multi-class classification on the data listed in Table II. Again, we do not remove samples that offered an ordered ciphersuite list that matched a list found in the default Windows XP SChannel implementation in this experiment because all of the samples would have the same bias. B. Feature Extraction
  • 13. To extract the data features of interest, we wrote software tools to extract the data features of interest from live traffic or packet capture files. The open source project will export all of the data in a convenient JSON format. The machine learning classifiers are built using traditional flow features, traditional “side-channel” features, and features collected from the unencrypted TLS handshake messages. 1) Flow Metadata: The first set of features investigated are modeled around traditional flow data that is typically collected in devices configured to export IPFIX/NetFlow. These features include the number of inbound bytes, outbound bytes, inbound packets, outbound packets; the source and destination ports; and the total duration of the flow in seconds. These features were normalized to have zero mean and unit variance. 2) Sequence of Packet Lengths and Times.: The sequence of packet lengths and packet inter-arrival times (SPLT) has been well studied [25], [39]. In our open source imple- mentation, the SPLT elements are collected for the first 50 packets of a flow. Zero-length payloads (such as ACKs) and retransmissions are ignored. A Markov chain representation is used to model the SPLT data. For both the lengths and times, the values are discretized into equally sized bins, e.g., for the length data, 150 byte bins are used where any packet size in the range [0,150) will go into the first bin, any packet size in the range [150,300) will go into the second bin, etc. A matrix A is then constructed where each entry, A[i,j], counts the number of transitions between the i’th and j’th bin. Finally, the rows of A are normalized to ensure a proper Markov chain. The entries of A are then used as features to the machine learning algorithms. 3) Byte Distribution.: The byte distribution is a length-256
  • 14. array that keeps a count for each byte value encountered in the payloads of the packets for each packet in the flow. The byte value probabilities can be easily computed by dividing the byte distribution counts by the total number of bytes found in the packets’ payloads. The 256 byte distribution probabilities are used as features by the machine learning algorithms. The full byte distribution provides a lot of information about the encoding of the data. Additionally, the byte distribution can give information about the header-to-payload ratios, the composition of the application headers, and if any poorly implemented padding is added. 4) Unencrypted TLS Header Information.: TLS (Transport Layer Security) is a cryptographic protocol that provides privacy for applications. TLS is usually implemented on top of common protocols such as HTTP for web browsing or SMTP for email. HTTPS is the usage of TLS over HTTP, which is the most popular way of securing communication between a web server and client, and is supported by most major web servers. HTTPS typically uses port 443. The TLS version, the ordered list of offered ciphersuites, and the list of supported TLS extensions are collected from the client hello message. The selected ciphersuite and selected TLS extensions are collected from the server hello message. The server’s certificate is collected from the certificate message. The client’s public key length is collected from the client key exchange message, and is the length of the RSA ciphertext or DH/ECDH public key, depending on the ciphersuite. Similar to the sequence of packet lengths and times, the sequence of record lengths, times, and types is collected from TLS sessions. In our classification algorithms, the list of offered cipher- suites, the list of advertised extensions, and the client’s public
  • 15. key length were used. 176 offered ciphersuite hex codes were observed in our full dataset, and a binary vector of length 176 was created where a one is assigned to each ciphersuite in the list of offered ciphersuites. Similarly, we observed 21 unique extensions, and a binary vector of length 21 was created where a one is assigned to each extension in the list of advertised extensions. Finally, the client’s public key length was represented as a single integer value. In total, 198 TLS client-based features were used in the classification algorithms. In some experiments, we use an additional TLS server-based binary feature: whether the certificate was self-signed or not. IV. MALWARE FAMILIES AND TLS Although malware uses TLS to secure its communication, our data suggests that for the majority of the families we analyzed, malware’s use of TLS is quite distinct from that of the enterprise network’s traffic. In this section, we highlight these differences from the perspective of the TLS client and also from the perspective of the TLS server. For the comparisons between general malware and enter- prise traffic, we first removed all of the TLS flows that offered an ordered ciphersuite list that matched a list found in the default Windows XP SChannel implementation [22], [29] from our full dataset. We found that ∼40% of TLS flows from malware samples offered this list. To help ensure that our analysis was capturing trends in the malware’s use of TLS, and not that of the underlying operating system, we removed all of these flows. After this filtering stage, we used all of the TLS flows in our dataset. From August 2015 to May 2016, we collected 133,744 TLS flows initiated by malicious programs that successfully negotiated the full TLS handshake and sent application data. In May and June 2016, we collected 1,500,005 TLS flows from an enterprise network using the same criteria.
  • 16. The malware data collection process can introduce biases in terms of malware family representation, and the conclusions that can be made from the TLS parameters collected. To account for this, we also analyze the TLS clients that malware uses and the TLS servers that malware connects to on a per- family basis. In this analysis, we highlight the families that use the default Windows TLS library, and the families which include their own TLS client. The data for this experiment is listed in Table II. 4 00 2f 00 35 00 0a c0 13 c0 09 c0 0a c0 14
  • 21. 40 50 60 P er ce nt ag e of F lo w s Client's Public Key Length Fire fox 47 Chr ome 51IE 1 1
  • 23. 10 15 20 25 30 TLS Client Fig. 1: Malware’s use of TLS versus that of enterprise network traffic relative to the TLS client features. Some values and the full ciphersuite names were omitted for clarity of presentation. Ciphersuites and extensions are represented as hex codes, which are given in full in Appendix A. A. TLS Clients 1) Malware versus Enterprise: Figure 1 illustrates the differences between the malware’s and the enterprise’s us- age of TLS with respect to the TLS clients after filter- ing typical Windows XP ciphersuite lists. Nearly 100% of the enterprise TLS sessions offered the 0x002f (TLS_RSA_WITH_AES_128_CBC_SHA) ciphersuite and the 0x0035 (TLS_RSA_WITH_AES_256_CBC_SHA) cipher- suite. On the other hand, nearly 100% of the malicious TLS sessions observed offered: • 0x000a (TLS_RSA_WITH_3DES_EDE_CBC_SHA) • 0x0005 (TLS_RSA_WITH_RC4_128_SHA) • 0x0004 (TLS_RSA_WITH_RC4_128_MD5)
  • 24. These three ciphersuites are considered weak, and although the enterprise traffic we observed does offer these ciphersuites, it does not offer them with the same frequency that the malicious traffic does. The differences in malware and enterprise’s TLS client hello messages become more evident when the advertised TLS extensions are considered. We observed a much greater diversity in the TLS extensions that enterprise clients adver- tised. Almost half of the enterprise clients would advertise up to 9 extensions, but the malicious clients would only consis- tently advertise one: 0x000d (signature_algorithms), an RFC MUST in most circumstances [13]. The following four extensions were observed in ∼50% of the enterprise traffic and rarely observed in the malicious traffic: • 0x0005 (status_request) • 0x0010 (supported_groups) • 0x3374 (next_protocol_negotiation) • 0x0017 (extended_master_secret) The client’s public key length, taken from the client key exchange message, has discriminatory power. As il- lustrated in Figure 1, most of the enterprise traffic used a 512-bit (ECDHE_RSA) public key. In contrast, malware almost exclusively used a 2048-bit (DHE_RSA) public key. 5 Malware Number Most Seen Number of Distinct Most
  • 25. Frequently Client’s Family of Flows TLS Client Ciphersuite Offer Vectors Advertised Extension Public Key Bergat 332 IE 8* 1 None 2048-bit (RSA) Deshacop 129 Tor Browser 4 3 SessionTicket TLS 2048-bit (RSA) Dridex 103 IE 11 5 ec_point_formats 2048-bit (RSA) supported_groups renegotiation_info Dynamer 372 Tor 0.2.2 10 SessionTicket TLS 512-bit (ECDHE_RSA) Kazy 1152 IE 8* 5 None 2048-bit (RSA) Parite 275 IE 8* 11 None 2048-bit (RSA) Razy 564 Tor Browser 4 8 None 2048-bit (RSA) Sality 1,200 IE 8* 133 None 2048-bit (RSA) Skeeyah 218 Tor 0.2.7 11 SessionTicket TLS 512-bit (ECDHE_RSA) Symmi 2,618 Opera 15 19 ec_point_formats 512-bit (ECDHE_RSA) supported_groups Tescrypt 205 IE 8* 6 None 2048-bit (RSA) Toga 404 Tor 0.2.2 2 SessionTicket TLS 2048-bit (RSA) ec_point_formats supported_groups Upatre 891 IE 8* 3 None 2048-bit (RSA) Virlock 12,847 Opera 12 1 signature_algorithms 2048-bit (DHE_RSA)
  • 26. Virtob 511 IE 8* 4 None 2048-bit (RSA) Yakes 337 IE 8* 3 None 2048-bit (RSA) Zbot 2,902 IE 8* 12 None 2048-bit (RSA) Zusy 733 IE 8* 7 None 2048-bit (RSA) TABLE III: The most popular TLS client configurations for the 18 malicious families. The TLS client was estimated using TLS fingerprinting techniques [29]. For TLS extensions, in the case of a tie, all equally probable extensions are listed. (*) indicates the fingerprint of the TLS client provided by the underlying sandbox operating system. Finally, we mapped the TLS client parameters to well known client programs that use specific TLS libraries and configurations [29]. This information could be spoofed, but we feel that this is still a valuable and compact way to represent a client. As shown in Figure 1, the most popular clients for malware and enterprise TLS connections are quite distinct. In the enterprise setting, we found that the four most common client configurations resembled the most recent releases of the four most popular browsers: Firefox 47, Chrome 51, Internet Explorer 11, and Safari 9. On the other hand, malware most frequently used TLS client parameters that matched those of Opera 12, Firefox 46, and Tor 0.2.x. 2) Malware Families: Table III gives the most popular TLS client parameters for each of the 18 malware families we had access to. The most popular TLS client was Internet Explorer 8, which was used most frequently by 10 of the 18 families. These families and client values are listed for completeness, but should more accurately be read as utilizing the TLS library provided by the underlying Windows environment. The Tor client and browser were very popular among the
  • 27. malware families, being the most popular with Deshacop, Dynamer, Razy, Skeeyah, and Toga. Dynamer, Skeeyah, and Symmi all used a 512-bit (ECDHE_RSA) public key as opposed to the most popular public key: 2048-bit (RSA), which is most likely an artifact of the underlying Windows environment. Table III also lists the number of distinct ciphersuite offer vectors observed for each malware family. In this context, a client is taken to be unique if it has a different set of offered ci- phersuites and advertised extensions. Some families have very few unique clients, e.g., Bergat. On the other hand, Sality has a large number of distinct ciphersuite offer vectors. And while Sality’s most used TLS client offered parameters similar to Internet Explorer 8, it had hundreds of other unique combinations of offered ciphersuites and advertised extensions. B. TLS Servers 1) Malware versus Enterprise: Figure 2 illustrates the differences between the servers connected to by the malware and the enterprise TLS clients after filtering clients that used typical Windows XP ciphersuite lists. The filtering was done for the server statistics because those clients have a significant impact on what is sent in the server hello message. As seen in Figure 2, the selected ciphersuites of the server hello messages are sharply divided for the major- ity of enterprise and malicious TLS sessions. The following four ciphersuites were selected by ∼90% of the servers that malware communicated with: • 0x000a (TLS_RSA_WITH_3DES_EDE_CBC_SHA) 6
  • 31. 60 Selected TLS Extensions Benign Malware 73 05 83 36 51 63 58 59 36 37 5 0 2 4 6 8 10 12 14 P
  • 32. er ce nt ag e of F lo w s Validity of Certificate (In Days) 2 1 10 5 7 12 3 0 10 20 30 40 50 Number of SAN Entries Fig. 2: Malware’s use of TLS versus that of enterprise network traffic relative to the TLS server features. Some values and the full ciphersuite names were omitted for clarity of presentation. Ciphersuites and extensions are represented as hex codes, which
  • 33. are given in full in Appendix A. • 0x0004 (TLS_RSA_WITH_RC4_128_MD5) • 0x006b (TLS_DHE_RSA_WITH_AES_256_CBC_SHA256) • 0x0005 (TLS_RSA_WITH_RC4_128_SHA) These ciphersuites were rarely selected by servers that enterprise hosts communicated with. TLS_RSA_WITH _RC4_128_MD5 and TLS_RSA_WITH_RC4_128_SHA are considered weak. As one would expect given the lack of advertised TLS extensions by the malware clients, the servers that malware communicated with rarely selected TLS extensions. On the other hand, the servers that the enterprise hosts communicated with had a much greater diversity in the selected TLS exten- sions with 0xff01 (renegotiation_info) and 0x000b (ec_point_formats) being the most frequent. We also analyzed information from the servers’ certifi- cates. As anticipated, we found that enterprise endpoints most frequently connected to servers with the following certificate subjects: • *.google.com • api.twitter.com • *.icloud.com • *.g.doubleclick.net • *.facebook.com
  • 34. This distribution of certificate subjects was very long tailed. The certificate subjects of servers that the malware sam- ples communicated with also had a long tail. These certifi- cates were mostly composed of subjects that had charac- teristics of a domain generation algorithm (DGA) [6], e.g., www.33mhwt2j.net. Although malware mostly communi- cated with servers that had suspicious certificate subjects, it is also clear that malware communicates with many inherently benign servers, e.g., google.com for connectivity checks or twitter.com for command and control. The following certificate subjects were the most frequent for TLS flows initiated by malware: • block.io • *.wpengine.com • *.criteo.com 7 Malware Number Unique Number of Selected Certificate Family of Flows Server IPs SS Certs Ciphersuite Subject Bergat 332 12 0 TLS_RSA_WITH_3DES_EDE_CBC_SHA www.dropbox.com Deshacop 129 38 0 TLS_RSA_WITH_3DES_EDE_CBC_SHA *.onion.to Dridex 103 10 89 TLS_RSA_WITH_AES_128_CBC_SHA amthonoup.cy Dynamer 372 155 3 TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 www.dropbox.com
  • 35. Kazy 1152 225 52 TLS_RSA_WITH_3DES_EDE_CBC_SHA *.onestore.ms Parite 275 128 0 TLS_RSA_WITH_3DES_EDE_CBC_SHA *.google.com Razy 564 118 16 TLS_RSA_WITH_RC4_128_SHA baidu.com Sality 1,200 323 4 TLS_RSA_WITH_3DES_EDE_CBC_SHA vastusdomains.com Skeeyah 218 90 0 TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 www.dropbox.com Symmi 2,618 700 22 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA *.criteo.com Tescrypt 205 26 0 TLS_RSA_WITH_3DES_EDE_CBC_SHA *.onion.to Toga 404 138 8 TLS_RSA_WITH_3DES_EDE_CBC_SHA www.dropbox.com Upatre 891 37 155 TLS_RSA_WITH_RC4_128_MD5 *.b7websites.net Virlock 12,847 1 0 TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 block.io Virtob 511 120 0 TLS_RSA_WITH_3DES_EDE_CBC_SHA *.g.doubleclick.net Yakes 337 51 0 TLS_RSA_WITH_RC4_128_SHA baidu.com Zbot 2,902 269 507 TLS_RSA_WITH_RC4_128_MD5 tridayacipta.com Zusy 733 145 14 TLS_RSA_WITH_3DES_EDE_CBC_SHA *.criteo.com TABLE IV: TLS server configurations for the servers most visited by the 18 malicious families. The certificate subject typically has a long tail, but only the most frequent is reported. The reported number of self-signed certificates is not necessarily related to the most popular certificate subject.
  • 36. • baidu.com • *.google.com Because the DGA-like certificate subjects are counted as unique, they do not show up in this list. Figure 2 highlights two other interesting features associated with server certificates: the validity of the certificate in days and the number of subjectAltName entries. Interestingly, the high prevalence of connections to block.io, a Bitcoin wallet, heavily skewed the validity (375 days) and number of subjectAltName entries (3) for the certificates of servers that malware connected to. It is also interesting to note the frequency of TLS servers using certificates that are self-signed. In the enterprise data, 1,352 out of the 1,500,005 TLS sessions, or ∼0.09%, used a self-signed certificate. In the malware data, 947 out of the 133,744 TLS sessions, or ∼0.7%, used a self-signed certificate, which is roughly an order of magnitude more frequent than the enterprise case. 2) Malware Families: Table IV lists several interesting statistics about the servers that malware most often connects to. Some of the malicious families connect to a large number of unique IP addresses, e.g., Symmi and Dynamer. The family with the most flows, Virlock, only connects to 1 unique IP address owned by block.io. We observed 10 families that made use of self-signed certificates. ZBot was the most frequent offender, with the subject of these certificates being tridayacipta.com, a domain name that has many detections on VirusTotal [2]. Common certificate subjects also allow one to make infer-
  • 37. ences about the tools that the malware families use and the functionality that the families support. For instance, Deshacop and Tescrypt have *.onion.to as the most common certifi- cate subject, and, as anticipated, both have many samples that have TLS client configurations that indicate that they use the Tor Browser. The Tor Browser is the most prevalent client for Deshacop, and the second most prevalent client for Tescrypt. Symmi’s most common certificate subject is *.criteo.com, an ad service. This could indicate Symmi’s intent to perform click-fraud. V. CLASSIFYING ENCRYPTED TRAFFIC We used a logistic regression classifier with an l1 penalty [20] for all classification results. For the initial binary-class classification results, we trained four machine learning classi- fiers using different subsets of data features we collected. The first classifier used the flow metadata (Meta), the sequence of packet lengths and inter-arrival times (SPLT), and the distribution of bytes (BD). The second classifier only used the TLS information (TLS). The third classifier was trained using the same features as the first, with the addition of the TLS client information, specifically, the offered ciphersuites, advertised extensions, and the client’s public key length. The fourth classifier was trained with all data, and an additional, custom feature: whether the server certificate was self-signed (SS). A. Malware versus Enterprise To demonstrate the value of the additional TLS features in a classification setting, we use 10-fold cross-validation and all 8
  • 38. All Data No SChannel Dataset Total Accuracy 0.01% FDR Total Accuracy 0.01% FDR Meta+SPLT+BD+TLS+SS 99.6% 92.6% 99.6% 87.4% Meta+SPLT+BD+TLS 99.6% 92.8% 99.6% 87.2% TLS 98.2% 63.8% 96.7% 59.1% Meta+SPLT+BD 98.9% 1.3% 98.5% 0.9% TABLE V: Classifier accuracy for different combinations of data features, showing the overall accuracy and the accuracy at a 0.01% FDR. Malware Family Meta+SPLT TLS Only Meta+SPLT All+SS +BD +BD+TLS Bergat* 100.0% 100.0% 100.0% 100.0% Kazy* 98.5% 99.5% 99.8% 100.0% Parite* 99.3% 97.8% 99.6% 99.6% Sality* 95.0% 94.1% 97.7% 98.0% Tescrypt* 89.8% 95.6% 97.6% 97.6% Upatre* 99.9% 98.7% 100.0% 100.0% Virtob* 99.2% 98.8% 99.4% 99.4% Yakes* 88.7% 98.5% 99.7% 99.7% Zbot* 98.9% 99.6% 99.7% 100.0% Zusy* 98.6% 88.7% 99.9% 99.9% Deshacop 93.0% 63.6% 96.1% 96.1% Dridex 16.5% 68.7% 78.5% 97.9% Dynamer 95.4% 78.8% 95.7% 96.5% Razy 91.5% 77.1% 95.9% 96.8% Skeeyah 95.9% 82.1% 98.6% 98.6% Symmi 99.1% 92.4% 99.8% 99.8% Toga 100.0% 100.0% 100.0% 100.0% Virlock 100.0% 100.0% 100.0% 100.0%
  • 39. TABLE VI: Classifier accuracy when separated by family. Families with an (*) offered an ordered ciphersuite list that matched a list found in the default Windows XP SChannel implementation. Malware data from August and September 2015, and enterprise data from May and June 2016 were used for training; these malware samples were collected from October 2015 to May 2016. Results using unencrypted TLS handshake messages are given in addition to results based on only standard side-channel features. The two baselines are the first two data columns: side-channel- only and TLS-only. of the malicious TLS flows collected from August 2015 until May 2016, and a random subset of the May and June 2016 enterprise network’s TLS flows. In total, there were 225,740 malicious and 225,000 enterprise flows for this experiment. To account for the bias that the Windows XP-based sandbox could introduce, we also present results on a dataset composed of only flows that did not offer an ordered ciphersuite list that matched a list found in the default Windows XP SChannel implementation [29]: 133,744 malicious and 135,000 enter- prise TLS flows. The 10-fold cross-validation results for the above problem is shown in Table V. We see that using all available data views significantly improves the results. A 1-in-10,000 false discovery rate (FDR) is defined as the accuracy on the positive class given that only 1 false positive is allowed for every 10,000 true positives. As these results show, not using TLS header information leads to significantly worse performance, especially in the important case of a fixed, 1-in-10,000 FDR. The removal of the Windows XP SChannel TLS flows had
  • 40. no effect on the total accuracy of the classifiers based on all data views, but does reduce the performance at a 1-in-10,000 FDR by ∼5%. B. Malware Families To determine how well a trained classifier is able to detect the TLS flows generated by the different malware families, we first trained the four classifiers from Table V on the same 225,000 enterprise flows as above for the negative class, and 76,760 malicious TLS flows collected during August and September 2015 for the positive class. These binary classifiers were applied to the testing data consisting of the TLS flows from October 2015 to May 2016, summarized in Table II. While we do not remove flows that offered an ordered cipher- suite list that matched a list found in the default Windows XP SChannel implementation in this experiment, we do make 9 c0 14 c0 13 c0 0a c0 09 00 35
  • 45. lo w s Client's Public Key Length IE 1 1 IE 9 IE 1 0 IE 8 Fire fox 46 Ope ra 1 2 1 7 0 20 40 60 80 100 TLS Client
  • 46. Fig. 3: Dridex’s use of TLS versus that of Virlock’s. Some values and the full ciphersuite names were omitted for clarity of presentation. Ciphersuites and extensions are represented as hex codes, which are given in full in Appendix A. explicit the families that have this bias in the majority of their flows. Table VI lists the classification accuracy of the four classi- fiers for each family. Because only malware data was used to test the trained classifiers, false positives for this experiment are ill-defined and are therefore not reported. In the August and September 2015 malware training data, there was strong representation of the malicious families presented in this paper, but there were not any exact SHA1 matches. There were four families that had no representation in August or September: Bergat, Yakes, Razy, and Dridex. For the most part, combining traditional flow metadata, typical side-channel information, and the TLS specific features led to the best performing machine learning models. Out of all families, our classifiers with all data views performed the worst on Deshacop with a 96.1% true positive rate. With respect to only the malware families that primarily used ciphersuites sim- ilar to those used by Windows XP SChannel-based clients, our classifiers with all data views performed the worst on Tescrypt with a 97.6% true positive rate. Both of these families most often visited servers with a server certificate subject of *.onion.to, and use TLS client configurations that indicate the Tor Browser for some of their TLS connections. This is particularly interesting because a major goal of the Tor Browser is to maintain the privacy of its users, which in this case are the malware families. The classifier based only on the TLS data was able to
  • 47. perform quite well on the malware families that used TLS client configurations that matched those of Windows XP SChannel-based clients, but this result is not guaranteed to hold if the malware runs on another operating system. The TLS-only classifier performed the worst on most of the families that used TLS client configurations that did not match those of Windows XP SChannel-based clients, with the exception of Toga and Virlock. Both of these families did a poor job at varying the TLS client parameters in our dataset, and they both used TLS client parameters that indicated older versions of clients: Toga → Tor 0.2.2 and Virlock → Opera 12. The machine learning classifiers were able to perform reasonably on most malware families, with the exception of Dridex. Dridex was one of four families that did not have 10 pa ri te te sc ry pt zb ot ka
  • 51. 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1.0 Fig. 4: Similarity Matrix for the different malware families with respect to the observed TLS client’s parameters. any representation in the training data. The classifier on the other three families, Bergat, Yakes, and Razy, had ∼96-100.0% total accuracy. In the case of Bergat and Yakes, this good performance is expected because these families offered an ordered ciphersuite list that matched a list found in the default Windows XP SChannel implementation. Figure 3 shows Dridex’s use of TLS from a client point- of-view. Unlike most of the other families, Dridex most often selects: • 0x002f (TLS_RSA_WITH_AES_128_CBC_SHA) Figure 2 shows that this ciphersuite is not uncommon for enterprise TLS sessions. Dridex also advertises several TLS
  • 52. extensions and offers many current ciphersuites in the client hello message. Figure 3 also compares Dridex’s TLS usage with that of Virlock’s. Virlock is an example of a malicious family that used the same TLS client for every sample that we observed, and was able to be easily classified, i.e., all four classifiers achieved 100% accuracy. While Dridex offers a variety of strong cipher- suites, Virlock offers a smaller set of outdated ciphersuites. Virlock also only advertises the signature_algorithms TLS extensions. Another significant difference between these two families is that Virlock did not alter its TLS client’s behavior once in our entire dataset. Virlock always used the same client parameters that are similar to those of Opera 12. Virlock’s lack of adaptation makes it trivial for a machine learning, or a rule-based, system to classify. Dridex’s use of multiple TLS clients made a significant difference in terms of detection efficacy. As we now show, awareness of self-signed certificates proved to be crucial. The classification of Dridex using Meta+SPLT+BD+TLS, 78.5%, does not inspire confidence in a system designed to detect malicious, encrypted traffic. Our hypothesis was that, although Dridex varies the behavior of its TLS clients, there might be an invariant with the servers that Dridex communicates with that would allow us to more easily classify these encrypted flows. Upon manual inspection, this hypothesis was confirmed. We included a binary feature indicating whether the server certificate was self-signed (de- noted as SS), and retrained our machine learning classifier with this new feature. The 10-fold cross-validation results on the training data were nearly identical. With the self-signed feature, the new classifier with all data sources achieved an accuracy of 97.9% on Dridex, a significant improvement.
  • 53. VI. FAMILY ATTRIBUTION Being able to accurately attribute malware samples to a known family is highly valuable. Attribution provides incident responders with actionable prior information before they begin to reverse engineer malware samples. From a network point- of-view, this attribution can help to prioritize the incident responders time, i.e., available resources should be assigned to investigate more serious infections. In these results, there are no enterprise samples; we only consider malicious samples and their associated families. To analyze the differences between the TLS parameters used by different malware families, we used the malware samples from October 2015 to May 2016 that had an iden- tifiable family name as described in Section III. This process pruned our original set of 20,548 samples to 5,623 unique samples across 18 families. These samples generated 25,793 TLS encrypted flows that successfully negotiated the full TLS handshake and sent application data. 11 ka zy sy m m i vi
  • 57. dridex T ru e la be l Confusion Matrix (Total Accuracy=90.3%) 0.0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1.0
  • 58. Fig. 5: Confusion matrix for the 18-class malware family classifier. The total 10-fold accuracy of the machine learning model was 90.3%. A. Similar TLS Usage Figure 4 shows a similarity matrix for the 18 malware fam- ilies with respect to their TLS clients. The offered ciphersuites, advertised extensions, and the client’s public key length were used as features, and a standard squared exponential similarity function was used to compute the similarity values: exp i,j (xi −xj)2 with λ = 1, and xi being the mean of the feature vectors for the i’th family. The diagonal of this matrix will be 1.0 because each family will be perfectly self-similar. There is a lot of structure in Figure 4. The upper left block consists of families that have some number of flows that use the default Windows XP TLS library. The group of Skeeyah, Dynamer, Symmi, and Toga all heavily make use of offered ciphersuite lists and advertised extensions that are indicative of Tor 0.2.x. Dridex and Virlock were the two most dissimilar malware families. And while Dridex was difficult to accurately classify, Virlock was trivial. Uniqueness
  • 59. is not always a desirable quality. B. Multi-Class Classification Finally, to assess the malware family attribution potential of TLS flows, we used the data listed in Table II, and did not remove samples that offered an ordered ciphersuite list that matched a list found in the default Windows XP SChannel implementation in this experiment because all of the samples would have the same bias. We position the problem of attribut- ing a malicious TLS flow to a known malware family as a multi-class classification problem. For this analysis, we use all of the malware families and data features described in Section III. Similar to the enterprise versus malware results in Section V, we used 10-fold cross validation and l1− multinomial logistic regression [21]. We not only present our results in terms of overall classification accuracy, but also as a confusion matrix showing the true positives and false positives broken down per-family. This was done to illustrate that we were not simply using a naı̈ ve majority-class classifier, but were in fact making useful inferences. Using all available data features led to the best cross- validated performance, with a total accuracy of 90.3% for the 18-class classification problem using a single, encrypted flow. The confusion matrix for this problem is shown in Figure 5. For a given row (family) in the confusion matrix, the column entries represent the percentage of samples identified as that specific family. A perfect confusion matrix would have all of its weight focused on the diagonal. As an example, most of Kazy’s TLS flows, the first row, were identified as Kazy, the first column. Some of Kazy’s TLS flows were also identified as Symmi (column: 2), Yakes (column: 4), Razy (column: 5), and Zbot (column: 8).
  • 60. The majority of the TLS flows were attributed to the appropriate family with ∼80-90% accuracy. Again, the two exceptions are Dridex and Virlock. Attribution for these two families are trivial, in large part because of their distinctive use of TLS compared to other malicious families. There were two sets of two families that the multiclass classification algorithm had problems differentiating. The first of these was Bergat and Dynamer. Interestingly, Bergat used a Windows XP SChannel-like TLS client, but Dynamer used 12 a tor 0.2.2-like TLS client. The confusion came from the other data views, specifically the sequence of packet lengths. Both of these families most often connected to servers at www.dropbox.com, and had similar communication pat- terns. Finally, Yakes and Razy were another two malicious fam- ilies that the multi-class classifier could not differentiate. Like Bergat and Dynamer, Yakes and Razy most often connected to servers at baidu.com. In fact, these two families are subfamilies of the Ramnit family. Upon manual inspection, the network behavior of Yakes and Razy looked mostly identical. Determining the malware family based on a single, en- crypted flow is an unnecessarily difficult problem. In our dataset, the malware samples often created many encrypted flows that can be used for attribution. In this framework, one could initially classify all of the flows in a 5 minute sliding window for a given host, and use the suspicious flows to perform family attribution. We first trained an independent flow, multi-class classifier. Then, for each window in the
  • 61. testing set, each flow was classified, and a majority vote was used to classify all flows within the window. This is similar to ensemble methods in machine learning [16]. The confusion matrix resulting from 10-fold cross validation on this problem looked very similar to that shown in Figure 5. The accuracy of the multi-class problem increased from 90.3% using single, encrypted flows to 93.2% using a simplistic multiple flow algorithm. While there were several families that had improved performance, this simple, multi-flow scheme increased the accuracy of Yakes and Razy most notably. This was most likely because Razy was more promiscuous. VII. RELATED WORK Identifying threats in encryption poses significant chal- lenges. Nevertheless, the security community has put forth two solutions to solve this problem. The first involves decrypting all traffic that flows through a security appliance: Man-in- the-Middle (MITM) [9]. Once the traffic has been decrypted, traditional signature-based methods, such as Snort [31], can be applied. While this approach can be successful at finding threats, there are several important shortcomings. First, this method does not respect the privacy of the users on the network. Second, this method is computationally expensive and difficult to deploy and maintain. Third, this method relies on malware clients and servers to not change their behavior when a MITM interposes itself. The second method of identifying threats in encrypted network traffic leverages flow-based metadata. These methods examine high-level features of a network flow, such as the number of packets and bytes within a flow. This data is typi- cally exported and stored as IPFIX [12] or NetFlow [11]. There have been several papers that push the limits of traditional flow monitoring systems. For instance, [8] uses NetFlow and external reputation scores to classify botnet traffic. This work
  • 62. can also be applied to encrypted network traffic, but does not take advantage of the TLS-specific data features. In addition to pure flow-based features to detect malware’s network traffic, there has been many papers that augment this data with more detailed features about a flow [14], [18], [24], [34], [35], [36], [37], [39]. This work can been seen as utilizing side-channel attacks, such as analyzing the sizes and inter-arrival times of packets, to learn more information about a flow. In [27], the authors derive features based on the packet sizes to perform website fingerprinting attacks against encrypted traffic. In our work, we are only concerned with identifying malware communication and we use information specific to the TLS protocol. There has been previous work that uses active probing [17] and passive monitoring to gain visibility into how TLS is used in the wild [19]. Unlike [19], our results specifically highlight malware’s use of the TLS protocol, and show how data features from TLS can be used in rules and classifiers. Malware clustering and family attribution has had a lot of exposure in the academic literature [5], [7], [28], [30]. This work has taken a variety of data source, e.g, HTTP or dynamic system call traces, and clustered the samples to attribute a sample to a malicious family. In contrast, our work gives an in-depth analysis of how malware uses TLS, and shows how data features from passive monitoring of TLS can be used for accurate malware identification and family attribution. VIII. LIMITATIONS AND FUTURE WORK Our method for collecting malware data was straightfor- ward and allowed us to quickly generate a large volume of network data, but the dependence on Windows XP and 5
  • 63. minute runs introduced some biases in our presented results. We accounted for these biases by specifically considering the cases in which the TLS features reflected the operating system and not the malware, and either analyzing the data with those cases removed, or clearly labeling and analyzing those cases otherwise. Accounting for the bias caused by the sandbox was essential to understanding the actual malware use of TLS. From a practitioners point of view, however, it is sometimes worthwhile to consider the raw, biased data. Malware often targets obsolete and unpatched software because it is vulnera- ble, and thus it is biased in the same direction as the sandbox. We leave running these samples under multiple environments and collecting the additional results for future work. After family names were associated with our malware samples, the original set of 20,548 samples that used TLS was reduced to a set of 5,623 unique samples across 18 families. It is difficult to reliably determine the family, if any, asso- ciated with a malware sample, even in a structured sandbox setting. While our multi-class, malware family classifier can reasonably be criticized for failing to provide attribution for ∼3/4 of the malware samples, this fact reflects the difficulty of family attribution in a dynamic analysis environment, and not a limitation of the underlying approach. In future work, the malware families for the training data can be determined by a robust clustering algorithm [5] instead of relying on a consensus vote from VirusTotal [2]. Like nearly all other methods of threat detection, a moti- vated threat actor could attempt to evade detection by mim- icking the features of enterprise traffic. For instance, in our case, this could take the form of attempting to offer the same TLS parameters as a popular Firefox browser and using a certificate issued by a reputable certificate authority. But, while evasion is always possible in principle, in practice it poses challenges for the malware operator. Mimicking a
  • 64. 13 popular HTTPS client implementation requires an ongoing and non-trivial software engineering effort; if a client offers a TLS ciphersuite or extension that it cannot actually support, the session is unlikely to complete. On the server side, the certificate must mimic the issuer, subjectAltName, time of issuance, and validity period of the benign server. In either case, the detection methods outlined in this paper are not meant to be exhaustive, and in a robust system, these methods would only be one facet of the final solution. An example of extending this methodology for robustness would be to build a profile for an endpoint based on the user-agent string advertised in the unencrypted HTTP flows. If the TLS parameters indicate a user agent that has not been observed on an endpoint, this could be an interesting indicator of compromise. All of the classification results presented in this paper used 10-fold cross-validation and l1-logistic regression. We have found this classifier to be very efficient and to perform extremely well for network data feature classification. This model reports a probabilistic output, allowing one to easily change the threshold of the classifier. We did compare l1- logistic regression with a support vector machine (Gaussian kernel, width adjusted through CV), and found no statistically- significant improvement using a 10-fold paired t-test at a 5% significance level [15]. Because of the added computational resources needed to train the SVM and the chosen model’s robustness against overfitting [38], we only reported the l1- logistic regression results. We leave examining alternative models and quantifying their advantages for future work. IX. CONCLUSIONS
  • 65. Understanding malware’s use of TLS is imperative for developing appropriate techniques to identify threats and re- spond to those threats accordingly. In this paper, we reviewed what TLS parameters malware typically uses from both the perspective of the TLS client and the TLS servers that the samples communicated with. Even when we accounted for the bias caused by the underlying sandbox’s operating system, we found that malware generally offers and selects weak ciphersuites and does not offer the variety of extensions that we see in enterprise clients. We also analyzed the TLS usage of malware on a per family basis. We identified malware families that are most likely to use TLS client parameters that matched the TLS library provided by Windows XP, the underlying operating system of the sandbox, e.g., Bergat and Yakes; malware families that use TLS client parameters that matched the TLS library provided by the underlying operating system in addition to hundreds of other TLS client configurations, e.g., Sality; and families that exclusively used TLS client configurations that do not match the TLS libraries supplied by the underlying operating system, e.g., Virlock. As anticipated, we found that families who actively evolve their usage of TLS are more difficult to classify. We also found a malware family that used TLS parameters that are similar to those found on an enterprise network, and was difficult to classify: Dridex. But, if we leverage additional, domain-specific knowledge such as whether the TLS certificate was self-signed, we can significantly increase the performance of our classifiers. We showed that the differences in how malware families use TLS can be used to attribute malicious, encrypted network flows to a specific malware family. We also observed some malware families using TLS in exactly the same way, e.g.,
  • 66. Yakes and Kazy, which most often offered an ordered cipher- suite list that matched a list found in the default Windows XP SChannel implementation. We demonstrated an accuracy of 90.3% for the family attribution problem when restricted to a single, encrypted flow, and an accuracy of 93.2% when we made use of all encrypted flows within a 5-minute window. We conclude that data features that are passively observed in TLS provide information about both the client and server software and its configuration. This data can be used to detect malware and perform family attribution, either through rules or classifiers. Malware’s TLS data features obtained from sandboxes are biased, and it is essential to understand and account for this bias when using these features REFERENCES [1] Most Internet Traffic will be Encrypted by Year End. Here’s Why. http://fortune.com/2015/04/30/netflix-internet-traffic- encrypted/, accessed: 2016-03-23 [2] Virus Total. https://www.virustotal.com/ (2016) [3] Zeus Source Code. https://github.com/Visgean/Zeus (2016) [4] Adrian, D., Bhargavan, K., Durumeric, Z., Gaudry, P., Green, M., Halderman, J.A., Heninger, N., Springall, D., Thomé, E., Valenta, L., VanderSloot, B., Wustrow, E., Zanella-Béguelin, S., Zimmermann, P.: Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice. In: Proceedings of the Conference on Computer and Communications Security (CCS) (2015)
  • 67. [5] Anderson, B., Storlie, C., Lane, T.: Multiple Kernel Learning Clustering with an Application to Malware. In: 12th International Conference on Data Mining (ICDM). pp. 804–809. IEEE (2012) [6] Antonakakis, M., Perdisci, R., Nadji, Y., Vasiloglou, N., Abu-Nimeh, S., Lee, W., Dagon, D.: From Throw-Away Traffic to Bots: Detecting the Rise of DGA-Based Malware. In: USENIX Security Symposium. pp. 491–506 (2012) [7] Bayer, U., Comparetti, P.M., Hlauschek, C., Kruegel, C., Kirda, E.: Scalable, Behavior-Based Malware Clustering. In: Proceedings of the Network and Distributed System Security Symposium (NDSS). vol. 9, pp. 8–11. Citeseer (2009) [8] Bilge, L., Balzarotti, D., Robertson, W., Kirda, E., Kruegel, C.: Disclo- sure: Detecting Botnet Command and Control Servers through Large- Scale NetFlow Analysis. In: Proceedings of the 28th Annual Computer Security Applications Conference. pp. 129–138. ACM (2012) [9] Callegati, F., Cerroni, W., Ramilli, M.: Man-in-the-Middle Attack to the HTTPS Protocol. IEEE Security & Privacy 7(1), 78–81 (2009) [10] Cisco Talos: IP Blacklist Feed.
  • 68. http://www.talosintel.com/feeds/ip-filter. blf (2016) [11] Claise, B.: Cisco Systems NetFlow Services Export Version 9 (2013), RFC 3954 [12] Claise, B., Trammell, B., Aitken, P.: Specification of the IP Flow Infor- mation Export (IPFIX) Protocol for the Exchange of Flow Information (2013), RFC 7011 [13] Dierks, T., Rescorla, E.: The Transport Layer Security (TLS) Protocol Version 1.2 (2008), RFC 5246 [14] Dietrich, C.J., Rossow, C., Pohlmann, N.: Cocospot: Clustering and Recognizing Botnet Command and Control Channels using Traffic Analysis. Computer Networks 57(2), 475–486 (2013) [15] Dietterich, T.G.: Approximate Statistical Tests for Comparing Super- vised Classification Learning Algorithms. Neural computation 10(7) (1998) [16] Dietterich, T.G.: Ensemble Methods in Machine Learning. In: Multiple classifier systems, pp. 1–15. Springer (2000) [17] Durumeric, Z., Wustrow, E., Halderman, J.A.: Zmap: Fast Internet- Wide Scanning and Its Security Applications. In: USENIX
  • 69. Security Symposium. pp. 605–620 (2013) 14 http://fortune.com/2015/04/30/netflix-internet-traffic-encrypted/ https://www.virustotal.com/ https://github.com/Visgean/Zeus http://www.talosintel.com/feeds/ip-filter.blf http://www.talosintel.com/feeds/ip-filter.blf [18] Gu, G., Perdisci, R., Zhang, J., Lee, W.: BotMiner: Clustering Analysis of Network Traffic for Protocol-and Structure-Independent Botnet De- tection. In: USENIX Security Symposium. vol. 5, pp. 139–154 (2008) [19] Holz, R., Amann, J., Mehani, O., Wachs, M., Kaafar, M.A.: TLS in the Wild: an Internet-Wide Analysis of TLS-Based Protocols for Electronic Communication. In: Proceedings of the Network and Distributed System Security Symposium (NDSS) (2016) [20] Koh, K., Kim, S.J., Boyd, S.P.: An Interior-Point Method for Large- Scale l1-Regularized Logistic Regression. Journal of Machine Learning Research 8(8), 1519–1555 (2007) [21] Krishnapuram, B., Carin, L., Figueiredo, M.A., Hartemink, A.J.: Sparse Multinomial Logistic Regression: Fast Algorithms and
  • 70. Generalization Bounds. Pattern Analysis and Machine Intelligence, IEEE Transactions on 27(6), 957–968 (2005) [22] Microsoft: Choose the right ciphersuites in SChannel. https://www.ssl. com/how-to/choose-the-right-cipher-suites-in-schannel-dll/ (2016) [23] Microsoft: SChannel. https://msdn.microsoft.com/en- us/library/ windows/desktop/ms678421%28v=vs.85%29.aspx (2016) [24] Moore, A.W., Zuev, D.: Internet Traffic Classification Using Bayesian Analysis Techniques. In: ACM SIGMETRICS Performance Evaluation Review. vol. 33, pp. 50–60. ACM (2005) [25] Nguyen, T.T., Armitage, G.: A Survey of Techniques for Internet Traffic Classification using Machine Learning. Communications Surveys & Tutorials, IEEE 10(4), 56–76 (2008) [26] Opderbeck, D.W., Hurwitz, J.G.: Apple v. FBI: Brief in Support of Neither Party in San Bernardino iPhone case. http://ssrn.com/abstract= 2746100 (2016) [27] Panchenko, A., Lanze, F., Zinnen, A., Henze, M., Pennekamp, J., Wehrle, K., Engel, T.: Website Fingerprinting at Internet Scale. In: Pro-
  • 71. ceedings of the Network and Distributed System Security Symposium (NDSS) (2016) [28] Perdisci, R., Lee, W., Feamster, N.: Behavioral Clustering of HTTP- Based Malware and Signature Generation using Malicious Network Traces. In: NSDI. pp. 391–404 (2010) [29] Qualys: Qualys SSL Labs. https://www.ssllabs.com/ssltest/clients.html (2016) [30] Rieck, K., Holz, T., Willems, C., Düssel, P., Laskov, P.: Learning and Classification of Malware Behavior. In: Detection of Intrusions and Malware, and Vulnerability Assessment, pp. 108–125. Springer (2008) [31] Roesch, M.: Snort - Lightweight Intrusion Detection for Networks. In: Proceedings of the 13th USENIX Conference on System Administra- tion. pp. 229–238. LISA, USENIX Association (1999) [32] Snort: Community Rules. https://www.snort.org/downloads/community/ community-rules.tar.gz (2016) [33] Vassilev, A.: Annex A: Approved Security Functions for FIPS PUB 140-2, Security Requirements for Cryptographic Modules. http://csrc. nist.gov/publications/fips/fips140-2/fips1402annexa.pdf (2016)
  • 72. [34] Wang, K., Cretu, G., Stolfo, S.J.: Anomalous Payload- Based Worm Detection and Signature Generation. In: Recent Advances in Intrusion Detection. pp. 227–246. Springer (2006) [35] Wang, L., Dyer, K.P., Akella, A., Ristenpart, T., Shrimpton, T.: Seeing through Network-Protocol Obfuscation. In: Proceedings of the Confer- ence on Computer and Communications Security (CCS). pp. 57– 69. ACM (2015) [36] Williams, N., Zander, S., Armitage, G.: A Preliminary Performance Comparison of Five Machine Learning Algorithms for Practical IP Traf- fic Flow Classification. Computer Communication Review 30 (2006) [37] Wurzinger, P., Bilge, L., Holz, T., Goebel, J., Kruegel, C., Kirda, E.: Automatically Generating Models for Botnet Detection. In: Computer Security–ESORICS 2009, pp. 232–249. Springer (2009) [38] Yuan, G.X., Ho, C.H., Lin, C.J.: An Improved GLMNET for L1- Regularized Logistic Regression. Journal of Machine Learning Research 13(Jun), 1999–2030 (2012) [39] Zander, S., Nguyen, T., Armitage, G.: Automated Traffic Classification
  • 73. and Application Identification using Machine Learning. In: The 30th IEEE Conference on Local Computer Networks. pp. 250–257. IEEE (2005) APPENDIX A CIPHERSUITE AND EXTENSION HEX CODES Hex Code Ciphersuite 0x0004 TLS_RSA_WITH_RC4_128_MD5 0x0005 TLS_RSA_WITH_RC4_128_SHA 0x000a TLS_RSA_WITH_3DES_EDE_CBC_SHA 0x002f TLS_RSA_WITH_AES_128_CBC_SHA 0x0033 TLS_DHE_RSA_WITH_AES_128_CBC_SHA 0x0035 TLS_RSA_WITH_AES_256_CBC_SHA 0x0039 TLS_DHE_RSA_WITH_AES_256_CBC_SHA 0x003c TLS_RSA_WITH_AES_128_CBC_SHA256 0x003d TLS_RSA_WITH_AES_256_CBC_SHA256 0x0067 TLS_DHE_RSA_WITH_AES_128_CBC_ SHA256 0x006b TLS_DHE_RSA_WITH_AES_256_CBC_ SHA256
  • 74. 0x00fd unassigned 0xc009 TLS_ECDHE_ECDSA_WITH_AES_128_CBC_ SHA 0xc00a TLS_ECDHE_ECDSA_WITH_AES_256_CBC_ SHA 0xc013 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA 0xc014 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA 0xc02b TLS_ECDHE_ECDSA_WITH_AES_128_GCM_ SHA256 0xc02f TLS_ECDHE_RSA_WITH_AES_128_GCM_ SHA256 0xc030 TLS_ECDHE_RSA_WITH_AES_256_GCM_ SHA384 TABLE VII: Hex code to ciphersuite mapping for ciphersuites used in figures. Hex Code Ciphersuite 0x0000 server_name 0x0005 status_request
  • 75. 0x000a supported_groups 0x000b ec_point_formats 0x000d signature_algorithms 0x000f heartbeat 0x0010 application_layer_protocol_ negotiation 0x0012 signed_certificate_timestamp 0x0015 padding 0x0017 extended_master_secret 0x0023 SessionTicket TLS 0x3374 next_protocol_negotiation 0x7550 channel_id 0xff01 renegotiation_info TABLE VIII: Hex code to extension mapping for extensions used in figures. 15 https://www.ssl.com/how-to/choose-the-right-cipher-suites-in- schannel-dll/ https://www.ssl.com/how-to/choose-the-right-cipher-suites-in- schannel-dll/ https://msdn.microsoft.com/en-
  • 76. us/library/windows/desktop/ms678421%28v=vs.85%29.aspx https://msdn.microsoft.com/en- us/library/windows/desktop/ms678421%28v=vs.85%29.aspx http://ssrn.com/abstract=2746100 http://ssrn.com/abstract=2746100 https://www.ssllabs.com/ssltest/clients.html https://www.snort.org/downloads/community/community- rules.tar.gz https://www.snort.org/downloads/community/community- rules.tar.gz http://csrc.nist.gov/publications/fips/fips140- 2/fips1402annexa.pdf http://csrc.nist.gov/publications/fips/fips140- 2/fips1402annexa.pdfI IntroductionII Preliminaries and AssumptionsIII DataIII-A Dataset and Sample SelectionIII-B Feature ExtractionIII-B1 Flow MetadataIII-B2 Sequence of Packet Lengths and Times.III-B3 Byte Distribution.III-B4 Unencrypted TLS Header Information.IV Malware Families and TLSIV-A TLS ClientsIV-A1 Malware versus EnterpriseIV-A2 Malware FamiliesIV-B TLS ServersIV-B1 Malware versus EnterpriseIV-B2 Malware FamiliesV Classifying Encrypted TrafficV-A Malware versus EnterpriseV-B Malware FamiliesVI Family AttributionVI-A Similar TLS UsageVI-B Multi-Class ClassificationVII Related WorkVIII Limitations and Future WorkIX ConclusionsReferencesAppendix A: Ciphersuite and Extension Hex Codes Running head: Discussion #1: The Essentials of Master's Educations in Nursing 1 Discussion #1: The Essentials of Master's Educations in Nursing 2
  • 77. Discussion #1: The Essentials of Master's Educations in Nursing Jenny Jauregui Florida National University Nursing Research Dr. Hirigoyen Jorge January 14, 2019 The Essentials of Master's Educations in Nursing For Master's nursing students, it is crucial to follow and integrate the essentials described on The Essentials of Master's Educations in Nursing to face the continuous changes in the health environment; including changes related with knowledge, technology, diversity, and globalization. These essentials provide Master’s students with a complete understanding of the discipline of nursing, allowing the graduates from the program to be involved in an advanced level practice, be leaders in a diversity of sceneries and commit to lifelong learning (AACN, 2011, p. 4). According to the information described in The
  • 78. Essential of Master's in Nursing the essentials define the knowledge and skills that all graduates from the nurse practitioner program should acquire "to lead changes, promote health, and elevate care in diverse roles and settings" (AACN, 2011, p. 3). There are nine essentials among The Essentials of Master's Education in Nursing, and I selected the essential IV: "Translating and Integrating Scholarship into Practice" to analyze its crucial importance in students’ success in the Master's Nursing Programs. Since nursing is a profession that bases all its work in the practice, "it is critical that clinical practice be based on scientific knowledge" (Cherry & Jacob, 2014, p. 89). One of the most vital elements that make up the scientific knowledge for nursing practices is research, because it helps authenticate and improve existing knowledge and make discoveries (Cherry & Jacob, 2014, p. 89). It is essential that nurses always try to find the correct rationale behind existing methods, ideas, and traditions in the nursing field and use evidence into practice. The Translating and Integrating Scholarship into Practice allows the program graduates to develop essential skills like knowledge, acquisition and dissemination, team working, and change management to apply the existent evidence-based practice in their daily work at the time of delivering care (AACN, 2011, p. 16). There is not doubt that this essential is a valuable resource that helps the formation of Nurse Practitioners as successful professionals who are able to provide the best interventions and the best nursing care based in translation and integration of the scholarship into practice. De otra estudiante Concerning the selection of one of the essentials and expanding on it, I settled for essential VIII – clinical prevention and population health for improving health. A master’s program of nursing designed to achieve this essential should equip the learners with the knowledge and skills to efficiently and effectively plan, deliver, manage and evaluate evidence-based
  • 79. clinical prevention and population care and services to individuals and families among other targeted populations (American Association of Colleges of Nursing, 2011). The learner at FNU, upon completion of the program, should deliver a client-centered, broad or organizational care that is also culturally appropriate. The program, therefore, ensures learners are adequately prepared to take upon inter-disciplinary care roles and be excellent patient-educators by building on their communication skills which is essential for proper diagnosis and treatment. Mis ideas del tema Relating to Essential VIII that you discussed in your post: I want to add that Health System in the U.S has been suffered considerable changes during the last years like health disparities and increase in population diversity. For that reason, it is essential that graduates from the master’s program develop skills and knowledge that allow them to provide care and services that are equitable an responsive to the unique cultural and ethnic identity, socio-economic conditions, emotional and spiritual needs, and values of the patient and population (AACN, 2011, p. 24) Mis ideas de Essential IX I agree with your post. I think It will be a long way to get to the last step of the phases that completes the nursing program: Essential IX “Master’s Level Nursing Practice.” However, it will be gratifying. In the last phase, we will be able to fully understand the foundations of care and the art of nursing practice as well as nursing theories. We will be able to implement safe quality care in different environments and roles (AACN, 2011, p. 26). We will also have the capacity to integrate concepts related to “quality improvement, patient safety, economics of health care, environmental sciences,
  • 80. epidemiology, genetics/genomics, gerontology, global health care environment and perspective, health policy, informatics, organization and systems, communication, negotiation, advocacy, and interprofessional practice “ (AACN, 2011, p. 26). The essential IX includes the practice-focused outcomes that have in account the realities of the health care in our days that are influenced by the faster changes in technology, and globalization. The learning experience based in a variety of settings, a deeper understanding of the nursing profession based on reflective practice, the lifelong learning and professional development (AACN, 2011, p. 26) are going to add valuable knowledge to our prior experience as nurses. At that point of the Master’s level we are going to be able to influences health care outcomes for individuals, populations, or systems. Idea de otro estudiante sobre ssential IX I believe that this essential is the outcome or final point that a Master’s students need to reach in order to be capable of leading changes, promote health and elevate care in various roles and settings (AACN, 2011, p. 3) ssential IX: Master’s-Level Nursing Practice: It is described as the final step or the phase that completes the program. At this level is expected for the nurse to be able to influence individually, wider populations, or institutions or systems through conscious intervention. It is expected a broad knowledge and understanding of the Science of Nursing considering the acquired experience that made possible the nurse to get to this level, and the experience acquired by the systematic practice. It is at this level when the nurse gets prepare to understand that the learning experience creates the basis for the nurse to accomplish the nursing role and deliver excellent care to families, populations, and individuals. These experiences will be a compliment beyond the acquired experiences in other nursing programs.
  • 81. References AACN. (2011, March 21). The Essentials of Master's Education in Nursing. Retrieved from https://fnu.blackboard.com. Cherry B. & Jacob S. (2014). Contemporary Nursing Issues, Trends and Management. (6th, Ed.) St. Louis: Elsevier Mosby.