Abstract
The use of encryption for network communication leads to a significant challenge in identifying malicious traffic. The existing malicious traffic detection techniques fail to identify malicious traffic from the encrypted traffic without decryption. The current research focuses on feature extraction and malicious traffic classification from the encrypted network traffic without decryption. In this paper, we propose an ensemble model using Deep Learning (DL), Machine Learning (ML), and self-attention-based methods. Also, we propose novel TLS features extracted from the network and perform experimentation on the ensemble model. The experimental results demonstrated that the ML-based (RF, LGBM, XGB) ensemble model achieved a significant accuracy of 94.85% whereas the other ensemble model using RF, LSTM, and Bi-LSTM with self-attention technique achieved an accuracy of 96.71%. To evaluate the efficacy of our proposed models, we curated datasets encompassing both phishing, legitimate and malware websites, leveraging features extracted from TLS 1.2 and 1.3 traffic without decryption.
Similar content being viewed by others
Data Availability
The dataset will be made available based on a reasonable request to the corresponding author.
References
Rescorla, E.: SSL and TLS Designing ADN Building Secure Systems. Addison-Wesley, Reading (2002)
Velan, P., Čermák, M., Čeleda, P., Drašar, M.: A survey of methods for encrypted traffic classification and analysis. Int. J. Netw. Manag. 25, 355–374 (2015)
Cao, Z., Xiong, G., Zhao, Y., Li, Z., Guo, L.: A survey on encrypted traffic classification. In: Applications and Techniques in Information Security: 5th International Conference, ATIS 2014, Melbourne, VIC, Australia, November 26–28, 2014. Proceedings 5, pp. 73–81 (2014)
Chen, J., Lv, T., Cai, S., Song, L., Yin, S.: A novel detection model for abnormal network traffic based on bidirectional temporal convolutional network. Inf. Softw. Technol. 157, 107166 (2023)
Kumar, M., Kondaiah, C., Pais, A., Rao, R.: Machine learning models for phishing detection from TLS traffic. Cluster Comput. 1–15 (2023)
Zheng, J., Zeng, Z., Feng, T.: GCN-ETA: high-efficiency encrypted malicious traffic detection. Secur. Commun. Netw. 1–11 (2022)
Weiss, K., Khoshgoftaar, T.: Detection of phishing webpages using heterogeneous transfer learning. In: 2017 IEEE 3rd International Conference on Collaboration and Internet Computing (CIC), pp. 190–197 (2017)
Zhang, W., Jiang, Q., Chen, L., Li, C.: Two-stage ELM for phishing web pages detection using hybrid features. World Wide Web. 20, 797–813 (2017)
Thabtah, F., Kamalov, F.: Phishing detection: a case analysis on classifiers with rules using machine learning. J. Inf. Knowl. Manag. 16, 1750034 (2017)
Zhang, J., Li, X.: Phishing detection method based on borderline-smote deep belief network. In: Security, Privacy, and Anonymity in Computation, Communication, and Storage: SpaCCS 2017 International Workshops, Guangzhou, China, December 12–15, 2017, Proceedings 10, pp. 45–53 (2017)
Rao, R., Vaishnavi, T., Pais, A.: CatchPhish: detection of phishing websites by inspecting URLs. J. Ambient Intell. Hum. Comput. 11, 813–825 (2020)
Sonowal, G., Kuppusamy, K.: PhiDMA-A phishing detection model with multi-filter approach. J. King Saud Univ. Comput. Inf. Sci. 32, 99–112 (2020)
Zhu, E., Chen, Z., Cui, J., Zhong, H.: MOE/RF: a novel phishing detection model based on revised multiobjective evolution optimization algorithm and random forest. IEEE Trans. Netw. Serv. Manag. 19, 4461–4478 (2022)
Marchal, S., François, J., State, R., Engel, T.: PhishStorm: detecting phishing with streaming analytics. IEEE Trans. Netw. Serv. Manag. 11, 458–471 (2014)
Moghimi, M., Varjani, A.: New rule-based phishing detection method. Expert Syst. Appl. 53, 231–242 (2016)
Rao, R., Pais, A.: Detection of phishing websites using an efficient feature-based machine learning framework. Neural Comput. Appl. 31, 3851–3873 (2019)
Mohammad, R., Thabtah, F., McCluskey, L.: Predicting phishing websites based on self-structuring neural network. Neural Comput. Appl. 25, 443–458 (2014)
Feng, J., Zhang, Y., Qiao, Y.: A detection method for phishing web page using DOM-based Doc2Vec model. J. Comput. Inf. Technol. 28, 19–31 (2020)
Marchal, S., Saari, K., Singh, N., Asokan, N.: Know your phish: novel techniques for detecting phishing sites and their targets. In: 2016 IEEE 36th International Conference on Distributed Computing Systems (ICDCS), pp. 323–333 (2016)
Marchal, S., Armano, G., Gröndahl, T., Saari, K., Singh, N., Asokan, N.: Off-the-hook: an efficient and usable client-side phishing prevention application. IEEE Trans. Comput. 66, 1717–1733 (2017)
Rao, R., Pais, A.: An enhanced blacklist method to detect phishing websites. In: Information Systems Security: 13th International Conference, ICISS 2017, Mumbai, India, December 16–20, 2017, Proceedings 13, pp. 323–333 (2017)
Cui, Q., Jourdan, G., Bochmann, G., Couturier, R., Onut, I.: Tracking phishing attacks over time. In: Proceedings of the 26th International Conference on World Wide Web, pp. 667–676 (2017)
Tanaka, S., Matsunaka, T., Yamada, A., Kubota, A.: Phishing site detection using similarity of website structure. In: 2021 IEEE Conference on Dependable and Secure Computing (DSC), pp. 1–8 (2021)
Mao, J., Li, P., Wei, T., et al.: Phishing-alarm: robust and efficient phishing detection via page component similarity. IEEE Access 5, 17020–17030 (2017)
Zhou, X., Verma, R.: Phishing sites detection from a web developer’s perspective using machine learning. In: HICSS, pp. 1–10 (2020)
Liu, D., Lee, J.: A cnn-based sia screenshot method to visually identify phishing websites. J. Netw. Syst. Manag. 32, 8 (2024)
Wang, M., Song, L., Li, L., Zhu, Y., Li, J.: Phishing webpage detection based on global and local visual similarity. Expert Syst. Appl. 252, 124120 (2024)
Trinh, N., Phan, T., Pham, V.: Leveraging deep learning image classifiers for visual similarity-based phishing website detection. In: Proceedings of the 11th International Symposium on Information and Communication Technology, pp. 134–141 (2022)
Chiew, K., Chang, E., Tiong, W.: Utilisation of website logo for phishing detection. Comput. Secur. 54, 16–26 (2015)
Xiang, G., Hong, J., Rose, C., Cranor, L.: Cantina+ a feature-rich machine learning framework for detecting phishing web sites. ACM Trans. Inf. Syst. Secur. 14, 1–28 (2011)
Tan, C., Chiew, K., Wong, K.: PhishWHO: phishing webpage detection via identity keywords extraction and target domain name finder. Decis. Support Syst. 88, 18–27 (2016)
Rao, R., Pais, A.: Jail-Phish: an improved search engine based phishing detection system. Comput. Secur. 83, 246–267 (2019)
Zhang, Y., Hong, J., Cranor, L.: Cantina: a content-based approach to detecting phishing web sites. In: Proceedings of the 16th International Conference on World Wide Web, pp. 639–648 (2007)
Mohammad, R., Thabtah, F., McCluskey, L.: An assessment of features related to phishing websites using an automated technique. In: 2012 International Conference for Internet Technology and Secured Transactions, pp. 492–497 (2012)
Mohammad, R., Thabtah, F., McCluskey, L.: Intelligent rule-based phishing websites classification. IET Inf. Secur. 8, 153–160 (2014)
Pham, C., Nguyen, L., Tran, N., Huh, E., Hong, C.: Phishing-aware: a neuro-fuzzy approach for anti-phishing on fog networks. IEEE Trans. Netw. Serv. Manag. 15, 1076–1089 (2018)
Basnet, R., Sung, A., Liu, Q.: Rule-based phishing attack detection. In: International Conference on Security and Management (SAM 2011), Las Vegas, NV (2011)
Han, W., Cao, Y., Bertino, E., Yong, J.: Using automated individual white-list to protect web digital identities. Expert Syst. Appl. 39, 11861–11869 (2012)
Jain, A., Gupta, B.: A novel approach to protect against phishing attacks at client side using auto-updated white-list. In: EURASIP Journal on Information Security, pp. 1–11 (2016)
Rao, R., Pais, A.: Two level filtering mechanism to detect phishing sites using lightweight visual similarity approach. J. Ambient Intell. Hum. Comput. 11, 3853–3872 (2020)
Sahingoz, O.K., Buber, E., Demir, O., Diri, B.: Machine learning based phishing detection from URLs. Expert Syst. Appl. 117, 345–357 (2019)
Li, Y., Yang, Z., Chen, X., Yuan, H., Liu, W.: A stacking model using URL and HTML features for phishing webpage detection. Future Gener. Comput. Syst. 94, 27–39 (2019)
Zhao, H., Chen, Z., Yan, R.: Malicious domain names detection algorithm based on statistical features of URLs. In: 2022 IEEE 25th International Conference on Computer Supported Cooperative Work in Design (CSCWD), pp. 11–16 (2022)
Bharadwaj, R., Bhatia, A., Chhibbar, L., Tiwari, K., Agrawal, A.: Is this URL safe: detection of malicious URLs using global vector for word representation. In: 2022 International Conference on Information Networking (ICOIN), pp. 486–491 (2022)
Gupta, B., Yadav, K., Razzak, I., Psannis, K., Castiglione, A., Chang, X.: A novel approach for phishing URLs detection using lexical based machine learning in a real-time environment. Comput. Commun. 175, 47–57 (2021)
Chaitanya, V., Deo, S., Thilagam, P.: User interest drift identification using contextual factors in implicit feedback-based recommender systems. In: International Conference on Pattern Recognition and Machine Intelligence, pp. 340–347 (2023)
Sinha, B., Dhanalakshmi, R., Chaitanya, V.: Diversifying the predictions in the recommender systems. Int. J. Bus. Inf. Syst. 38, 168–178 (2021)
Anderson, B., McGrew, D.: Identifying encrypted malware traffic with contextual flow data. In: Proceedings of The 2016 ACM Workshop on Artificial Intelligence and Security, pp. 35–46 (2016)
Anderson, B., Paul, S., McGrew, D.: Deciphering malware’s use of TLS (without decryption). J. Comput. Virol. Hacking Tech. 14, 195–211 (2018)
Shekhawat, A., Di Troia, F., Stamp, M.: Feature analysis of encrypted malicious traffic. Expert Syst. Appl. 125, 130–141 (2019)
Ramiz, M., Sh, M.: Classification ensemble based anomaly detection in network traffic. Rev. Comput. Eng. Res. 6, 12–23 (2019)
Yao, H., Liu, C., Zhang, P., Wu, S., Jiang, C., Yu, S.: Identification of encrypted traffic through attention mechanism based long short term memory. IEEE Trans. Big Data 8, 241–252 (2019)
Kashyap, H., Pais, A., Kondaiah, C.: Machine learning-based malware detection and classification in encrypted TLS traffic. In: International Conference on Security, Privacy and Data Analytics, pp. 247–262 (2022)
Wang, Z., Fok, K., Thing, V.: Machine learning for encrypted malicious traffic detection: approaches, datasets and comparative study. Comput. Secur. 113, 102542 (2022)
Hranickỳ, R., Horák, A., Polišenskỳ, J., Jeřábek, K., Ryšavỳ, O.: Unmasking the phishermen: phishing domain detection with machine learning and multi-source intelligence. In: NOMS 2024–2024 IEEE Network Operations and Management Symposium, pp. 1–5 (2024)
McGrew, D., Joy, B.: Cisco JOY (2016). https://github.com/cisco/joy
Garcia, S., Grill, M., Stiborek, J., Zunino, A.: An empirical comparison of botnet detection methods. Comput. Secur. 45, 100–123 (2014)
Saha, I., Sarma, D., Chakma, R., Alam, M., Sultana, A., Hossain, S.: Phishing attacks detection using deep learning approach. In: 2020 Third International Conference on Smart Systems and Inventive Technology (ICSSIT), pp. 1180–1185 (2020)
Barlow, L., Bendiab, G., Shiaeles, S., Savage, N.: A novel approach to detect phishing attacks using binary visualisation and machine learning. In: 2020 IEEE World Congress on Services (SERVICES), pp. 177–182 (2020)
Raj, R., Babu, S., Varalatchoumy, M., Kathirvel, C.: Implementing multiclass classification to find the optimal machine learning model for forecasting malicious URLs. In: 2022 6th International Conference on Computing Methodologies and Communication (ICCMC), pp. 1127–1130 (2022)
Mahesh, A., Dheepthi.: Using machine learning to detect and classify URLs: a phishing detection approach. In: 2023 4th International Conference on Electronics and Sustainable Communication Systems (ICESC), pp. 1285–1291 (2023)
Funding
The author declares that there is no funding for this paper.
Author information
Authors and Affiliations
Contributions
Chhemaladinne Kondaiah: Conceptualized, Performed experimentation, Wrote the manuscript. Alwyn Roshan Pais: Supervised, Reviewed, and Edited the manuscript. Routhu Srinivasa Rao: Supervised, Reviewed, and Edited the manuscript.
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Kondaiah, C., Pais, A.R. & Rao, R.S. Enhanced Malicious Traffic Detection in Encrypted Communication Using TLS Features and a Multi-class Classifier Ensemble. J Netw Syst Manage 32, 76 (2024). https://doi.org/10.1007/s10922-024-09847-3
Received:
Accepted:
Published:
DOI: https://doi.org/10.1007/s10922-024-09847-3