Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore advanced techniques for detecting malware in encrypted HTTPS traffic without decryption in this conference talk from BruCON Security Conference. Delve into a machine learning approach that utilizes Bro IDS logs to analyze network behavior and identify malicious connections. Learn about the 30 different features extracted from flow data, SSL handshakes, and X.509 certificates, and how they are used to create a powerful detection model. Discover the importance of connection 4-tuple aggregation in summarizing malware behavior when connecting to C&C servers. Gain insights into the extensive dataset used for training, including malware samples from CTU-13 and the Stratosphere Malware Capture Facility Project. Understand the challenges and benefits of this privacy-respecting method that maintains the original intent of HTTPS while providing effective malware detection.