
[5]
Kevin Borders and Atul Prakash. 2004. Web Tap: Detecting Covert Web Traffic.
In Proceedings of the 11th ACM Conference on Computer and Communications
Security, CCS 2004, Washington, DC, USA, October 25-29, 2004. ACM, 110–120.
[6]
Kevin Borders and Atul Prakash. 2009. Quantifying Information Leaks in Out-
bound Web Traffic. In 30th IEEE Symposium on Security and Privacy (S&P 2009),
17-20 May 2009, Oakland, California, USA. IEEE Computer Society, 129–140.
[7]
Andrea Continella, Alessandro Guagnelli, Giovanni Zingaro, Giulio De Pasquale,
Alessandro Barenghi, Stefano Zanero, and Federico Maggi. 2016. ShieldFS: a
Self-Healing, Ransomware-aware Filesystem. In Proceedings of the 32nd Annual
Conference on Computer Security Applications, ACSAC 2016, Los Angeles, CA, USA,
December 5-9, 2016. ACM, 336–347.
[8] Zakir Durumeric, Zane Ma, Drew Springall, Richard Barnes, Nick Sullivan, Elie
Bursztein, Micheal Bailey, J. AlexHalderman, and Vern Paxson. 2017. The Security
Impact of HTTPS Interception. In Proceedings of the Network and Distributed
System Security Symposium, NDSS, San Diego, California, USA, 26th February - 1st
March, 2017. The Internet Society.
[9]
Laura Feinstein, Dan Schnackenberg, Ravindra Balupari, and Darrell Kindred.
2003. Statistical Approaches to DDoS Attack Detection and Response. In 3rd
DARPA Information Survivability Conference and Exposition (DISCEX-III 2003),
22-24 April 2003, Washington, DC, USA. IEEE Computer Society, 303.
[10]
Guofei Gu, Roberto Perdisci, Junjie Zhang, and Wenke Lee. 2008. BotMiner:
Clustering Analysis of Network Traffic for Protocol and Structure-Independent
Botnet Detection. In Proceedings of the 17th USENIX Security Symposium, July
28-August 1, 2008, San Jose, CA, USA. USENIX Association, 139–154.
[11]
Guofei Gu, Junjie Zhang, and Wenke Lee. 2008. BotSniffer: Detecting Botnet
Command and Control Channels in Network Traffic. In Proceedings of the Network
and Distributed System Security Symposium, NDSS 2008, San Diego, CA, USA, 10th
February - 13th February 2008. The Internet Society.
[12]
Michael Hart, Pratyusa K. Manadhata, and Rob Johnson. 2011. Text Classifica-
tion for Data Loss Prevention. In Privacy Enhancing Technologies - 11th Interna-
tional Symposium, PETS 2011, Waterloo, ON, Canada, July 27-29, 2011. Proceedings.
Springer, 18–37.
[13]
Gaofeng He, Tao Zhang, Yuanyuan Ma, and Bingfeng Xu. 2014. A Novel Method
to Detect Encrypted Data Exfiltration. In Second International Conference on
Advanced Cloud and Big Data, CBD 2014, Huangshan, China, November 20-22,
2014. IEEE Computer Society, 240–246.
[14]
Gilad Katz, Yuval Elovici, and Bracha Shapira. 2014. CoBAn: A Context-based
Model for Data Leakage Prevention. Information Sciences 262 (2014), 137–158.
[15]
Nizar Kheir. 2012. Analyzing HT TP User Agent Anomalies for Malware Detec-
tion. In Data Privacy Management and Autonomous Spontaneous Security, 7th
International Workshop, DPM 2012, Pisa, Italy, September 13-14, 2012. Springer,
187–200.
[16]
Christopher Krügel and Giovanni Vigna. 2003. Anomaly Detection of Web-
based Attacks. In Proceedings of the 10th ACM Conference on Computer and
Communications Security, CCS 2003, Washington, DC, USA, October 27-30, 2003.
ACM, 251–261.
[17]
Christopher Neasbitt, Roberto Perdisci, Kang Li, and Terry Nelms. 2014. Click-
Miner: Towards Forensic Reconstruction of User-Browser Interactions from
Network Traces. In Proceedings of the 2014 ACM SIGSAC Conference on Computer
and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014. 1244–1255.
[18]
Terry Nelms, Roberto Perdisci, and Mustaque Ahamad. 2013. ExecScent: Mining
for New C&C Domains in Live Networks with Adaptive Control Protocol Tem-
plates. In Proceedings of the 22th USENIX Security Symposium, Washington, DC,
USA, August 14-16, 2013. USENIX Association, 589–604.
[19]
Vern Paxson. 1999. Bro: a System for Detecting Network Intruders in Real-time.
Computer Networks 31, 23-24 (1999), 2435–2463.
[20]
Roberto Perdisci, Davide Ariu, and Giorgio Giacinto. 2013. Scalable Fine-grained
Behavioral Clustering of HTTP-based Malware. Computer Networks 57, 2 (2013),
487–500.
[21]
Roberto Perdisci, Wenke Lee, and Nick Feamster. 2010. Behavioral Clustering
of HTTP-Based Malware and Signature Generation Using Malicious Network
Traces. In Proceedings of the 7th USENIX Symposium on Networked Systems Design
and Implementation, NSDI 2010, April 28-30, 2010, San Jose, CA, USA. USENIX
Association, 391–404.
[22]
M. Zubair Rafique and Juan Caballero. 2013. FIRMA: Malware Clustering and
Network Signature Generation with Mixed Network Behaviors. In Research in
Attacks, Intrusions, and Defenses - 16th International Symposium, RAID 2013,
Rodney Bay, St. Lucia, October 23-25, 2013. Proceedings. Springer, 144–163.
[23]
Christian Rossow, Christian J Dietrich, Herbert Bos, Lorenzo Cavallaro, Maarten
Van Steen, Felix C Freiling, and Norbert Pohlmann. 2011. Sandnet: Network
traffic analysis of malicious software. In Proceedings of the First Workshop on
Building Analysis Datasets and Gathering Experience Returns for Security. ACM,
78–88.
[24]
Guido Schwenk and Konrad Rieck. 2011. Adaptive Detection of Covert Commu-
nication in HTTP Requests. In Seventh European Conference on Computer Network
Defense, EC2ND 2011, Gothenburg, Sweden, September 6-7, 2011. IEEE Computer
Society, 25–32.
[25]
Xiaokui Shu and Danfeng Yao. 2012. Data Leak Detection as a Service. In Security
and Privacy in Communication Networks - 8th International ICST Conference,
SecureComm 2012, Padua, Italy, September 3-5, 2012. Springer, 222–240.
[26]
Xiaokui Shu, Danfeng Yao, and Elisa Bertino. 2015. Privacy-Preserving Detection
of Sensitive Data Exposure. IEEE Trans. Information Forensics and Security 10, 5
(2015), 1092–1103.
[27]
Xiaokui Shu, Jing Zhang, Danfeng Yao, and Wu-chun Feng. 2016. Fast Detection
of Transformed Data Leaks. IEEE Trans. Information Forensics and Security 11, 3
(2016), 528–542.
[28]
Aditya K. Sood, Sherali Zeadally, and Richard J. Enbody. 2016. An Empirical
Study of HTTP-based Financial Botnets. IEEE Trans. Dependable Sec. Comput. 13,
2 (2016), 236–251.
[29]
Veronica Valeros. 2016. In plain sight: Credential and data
stealing adware. (2016). http://blogs.cisco.com/security/
in-plain- sight-credential- and-data-stealing- adware
[30]
Shobha Venkataraman, Juan Caballero, Pongsin Poosankam, Min Gyung Kang,
and Dawn Xiaodong Song. 2007. Fig: Automatic Fingerprint Generation. In
Proceedings of the Network and Distributed System Security Symposium, NDSS
2007, San Diego, California, USA, 28th February - 2nd March 2007. The Internet
Society.
[31]
Verizon. 2016. Data Breach Investigations Report. (2016). http://www.
verizonenterprise.com/verizon-insights-lab/dbir/2016/
[32]
Guowu Xie, Marios Iliofotou, Thomas Karagiannis, Michalis Faloutsos, and Yaohui
Jin. 2013. ReSurf: Reconstructing Web-Surfing Activity from Network Traffic.
In IFIP Networking Conference, 2013, Brooklyn, New York, USA, 22-24 May, 2013.
IEEE, 1–9.
[33]
Ali Zand, Giovanni Vigna, Xifeng Yan, and Christopher Kruegel. 2014. Extracting
Probable Command and Control Signatures for Detecting Botnets. In Symposium
on Applied Computing, SAC 2014, Gyeongju, Republic of Korea - March 24 - 28,
2014. 1657–1662.
[34] Apostolis Zarras, Antonis Papadogiannakis, Robert Gawlik, and Thorsten Holz.
2014. Automated Generation of Models for Fast and Precise Detection of HT TP-
based Malware. In 2014 Twelfth Annual International Conference on Privacy, Secu-
rity and Trust, Toronto, ON, Canada, July 23-24, 2014. 249–256.
[35]
Hao Zhang, Danfeng (Daphne) Yao, Naren Ramakrishnan, and Zhibin Zhang.
2016. Causality Reasoning about Network Events for Detecting Stealthy Malware
Activities. Computers & Security 58 (2016), 180–198.
[36]
Elzbieta Zielinska, Wojciech Mazurczyk,and Krzysztof Szczypiorski. 2014. Trends
in Steganography. Commununications of ACM 57, 3 (2014), 86–95.
A ALGORITHMS
A.1 Outgoing Information
Algorithm 1 Computation of Outgoing Information
Require:
the current request
REQi
, the latest request
REQi−1
trans-
mitted by the same application.
1: procedure ComputeOutInfo(REQi,REQi−1)
2: OI 0▷Initialize counter
3: for all hjin REQido ▷hjis the jth header in REQ
4: if hjin REQi−1then
5: OI += edit_dist (REQi.hj,REQi−1.hj)
6: else
7: OI += length(REQi.hj)
8: end if
9: end for
10: OI += edit_dist(REQi.body, REQi−1.body)
11: updateCache(REQi.huser-agent,REQi)
12: return OI
13: end procedure
The outgoing information is computed through
ComputeOutInfo
,
which takes as input two values: the new incoming request
REQi
,
and the latest analyzed request
REQi−1
, which is stored in a cache
(i.e., hash table) that uses the user-agent strings as keys. The func-
tion verifies if there are headers (including
URI
) present in
REQi
that are also present in
REQi−1
(line 3-4). If so, it computes the edit