
Some of the features need additional investigations.
These include payload data length or the value of some
popular headers such as Accept,Accept-Encoding,Language,
and Connection. Analysis of their values could be correlated
with the inspection of the User-Agent value in such way that
the occurrence of the particular value in 1 header should
imply a defined value in the other.
Additional issue is caused by the GET requests with
payload data. They were not present in the analyzed browser
dataset, but they were rarely seen in the malware dataset.
RFC 7230 does not prohibit sending such requests, but
experience tells to monitor them. Despite low-level occur-
rence of these requests, the authors consider them as an
anomaly.
In order to search for suspicious requests, features and
anomalies identified in the course of this analysis can be
directly applied to the existing network monitoring systems,
such as IDSs or malware sandboxes. Also, with the use of the
presented results, it would be feasible to create a malware
detection system. Such a system could detect new malware
samples in which presented anomalies appear. Finally, this
work can be utilized to create a fingerprinting system which
can be used as an identification mechanism of similar
malware requests or as a source to create a whitelist of
known applications in the network. The authors plan to
explore these directions in their future work.
Data Availability
A part of the pcap files used in this study origins from the
Malware Capture Facility Project (MCFP) and is publicly
available at https://www.stratosphereips.org/datasets-
malware. PCAP files from CERT Polska’s sandbox system
and web browser traffic have not been made publicly
available because of commercial confidentiality and privacy
reasons.
Conflicts of Interest
The authors declare that there are no conflicts of interest
regarding the publication of this article.
Acknowledgments
This research was partially supported by the EU Horizon
2020 program towards the Internet of Radio-Light project
(H2020-ICT 761992).
References
[1] M. Trevisan, D. Giordano, I. Drago, M. Mellia, and
M. Munafo, “Five years at the edge: watching Internet from
the ISP network,” in Proceedings of the 14th International
Conference on emerging Networking Experiments and Tech-
nologies, ACM, Heraklion, Greece, pp. 1–12, December 201 .
[2] P. Richter, N. Chatzis, G. Smaragdakis, A. Feldmann, and
W. Willinger, “Distilling the Internet’s application mix from
packet-sampled traffic,” in Passive and Active Measurement,
J. Mirkovic and Y. Liu, Eds., pp. 179–192, Springer Inter-
national Publishing, Cham, Switzerland, 2015.
[3] S. Miller and P. Smith, Rise of Legitimate Services for Backdoor
Command and Control, Anomali, Tech. Rep., 2017, https://www.
anomali.com/files/anomali-labs-reports/legit-services.pdf.
[4] S. Tkachenko, Stop Windows 10 Spying on You Using Just
Windows Firewall, https://winaero.com/blog/stop-windows-
10-spying-on-you-using-just-windows-firewall/, 2015.
[5] Block Windows Update with Firewall, 201 , https://www.reddit.
com/r/MoneroMining/comments/ l5wpt/block_windows
_update_with_firewall/.
[6] B. Duncan, 019-03-15-Malspam Pushes Lokibot, http://
malware-traffic-analysis.net/2019/03/15/index2.html, 2019.
[7] P. Srokosz, Analysis of Emotet V4, https://www.cert.pl/en/
news/single/analysis-of-emotet-v4/, 2017.
[ ] E. Brumaghin and H. Unterbrink, Picking Apart Remcos
Botnet-In-A-Box, https://blog.talosintelligence.com/201 /0 /
picking-apart-remcos.html, 201 .
[9] R. Joven, New Stealth Worker Campaign Creates a Multi-
Platform Army of Brute Forcers, https://www.fortinet.com/blog/
threat-research/new-stealth-worker-campaign-creates-a-multi-
platform-army-of-bru.html, 2019.
[10] A.-T. GmbH, AV-TEST Security Report 018/ 019, AV-TEST
Institute, Tech. Rep., 2019, https://www.av-test.org/fileadmin/
pdf/security_report/AV-TEST_Security_Report_201 -2019.pdf.
[11] C. Rossow, C. J. Dietrich, H. Bos et al., “Sandnet: network
traffic analysis of malicious software,” in Proceedings of the
First Workshop on Building Analysis Datasets and Gathering
Experience Returns for Security, ACM, New York, NY, USA,
pp. 7 – , 2011.
[12] A. Nelson, “Sandnet++-a framework for analysing and vis-
ualising network traffic from malware,” Information Security
Group, Royal Holloway University of London, Tech. Rep.,
2016.
[13] M. C. Calzarossa and L. Massari, “Analysis of header usage
patterns of HTTP request messages,,” in Proceedings of the
014 IEEE International Conference on High Performance
Computing and Communications, 014 IEEE 6th International
Symposium on Cyberspace Safety and Security, 014 IEEE 11th
International Conference on Embedded Software and Syst
(HPCC, CSS, ICESS), pp. 47– 53, IEEE, Paris, France, 2014.
[14] R. Montoro, “HTTP Header Hunter-Looking for malicious
behavior into your HTTP header traffic,” 2011, http://2011.
video.sector.ca/video/397 6962.
[15] “Cuckoo sandbox network CnC HTTP community module,”
2019, https://github.com/cuckoosandbox/community/blob/
master/modules/signatures/network/network_cnc_http.py.
[16] “Cuckoo sandbox multiple user-agents community module,”
https://github.com/cuckoosandbox/community/blob/master/
modules/signatures/windows/multiple_ua.py.
[17] T. Lewis, “HTTP header heuristics for malware detection,”
SANS Institute InfoSec Reading Room, Tech. Rep., 2013.
[1 ] S. Mizuno, M. Hatada, T. Mori, and S. Goto, “Botdetector: a
robust and scalable approach toward detecting malware-in-
fected devices,” in Proceedings of the 017 IEEE Int. Conference
on Communications (ICC), IEEE, Paris, France, pp. 1–7, May
2017.
[19] Z. Li, L. Sun, Q. Yan, W. Srisa-an, and Z. Chen, “Droid-
classifier: efficient adaptive mining of application-layer header
for classifying android malware,” in Proceedings of the In-
ternational Conference on Security and Privacy in Commu-
nication Systems, Springer, Guangzhou, China, pp. 597–616,
October 2016.
[20] N. Kheir, “Behavioral classification and detection of malware
through HTTP user agent anomalies,” Journal of Information
Security and Applications, vol. 1 , no. 1, pp. 2–13, 2013.
Security and Communication Networks 25