Detection of malicious Encrypted Web Traffic using Machine Learning
dc.contributor.author | Shah, Jay | |
dc.contributor.supervisor | Baniasadi, Amirali | |
dc.contributor.supervisor | Traore, Issa | |
dc.date.accessioned | 2018-11-16T03:36:49Z | |
dc.date.available | 2018-11-16T03:36:49Z | |
dc.date.copyright | 2018 | en_US |
dc.date.issued | 2018-11-15 | |
dc.degree.department | Department of Electrical and Computer Engineering | en_US |
dc.degree.level | Master of Engineering M.Eng. | en_US |
dc.description.abstract | An increasing amount of web traffic is currently encrypted using HTTPS. While most of the HTTPS traffic is legitimate, a growing slice is generated by malware. The use of the HTTPS protocol by malware makes its detection more challenging. The current approach is to detect HTTPS malware traffic by using HTTPS interceptor proxies. This method requires decrypting the traffic on the fly, which poses some threat to the data and communication security and privacy. The goal of this project is to detect HTTPS malicious traffic without decryption. We propose a new detection model that leverages the underlying HTTPS certificate characteristics and connection data that are fed to a machine learning classifier. Our model consists of a set of features extracted from log files generated from the Bro Intrusion Detection System (IDS), which are classified using the XGBoost algorithm. Experimental evaluation is conducted using a public dataset, yielding encouraging results. | en_US |
dc.description.scholarlevel | Graduate | en_US |
dc.identifier.uri | http://hdl.handle.net/1828/10313 | |
dc.language.iso | en | en_US |
dc.rights | Available to the World Wide Web | en_US |
dc.title | Detection of malicious Encrypted Web Traffic using Machine Learning | en_US |
dc.type | Project | en_US |