Detecting Malicious websites using Machine Learning

BSidesDC 2016

Presented by: Andrew Beard, Ajit Thyagarajan
Date: Saturday October 22, 2016
Time: 11:30 - 12:20
Location: Grand Central
Track: Track 2

We have developed a set of techniques to uncover malicious websites that operate under the veil of TLS. An increasing number of websites that disseminate malware are now served over HTTPS using valid SSL certificates (not necessarily self-signed). This makes it increasingly difficult for IPS/IDS and network security tools to decode the payload and thus prevent the propagation of malware. Is all hope lost?

No, we present a set of newly tuned algorithms that can distinguish between malicious and non-malicious websites with a high degree of accuracy using Machine Learning (ML). We use the Bro IDS/IPS tool for training our algorithm using a novel idea that simplifies the training phase significantly. Bro is a very effective and simple tool for analyzing and extracting data from network traffic.

The extracted data is loaded into multiple ML frameworks such as Splunk, AWS ML and we run a series of Machine Learning algorithms to identify those attributes that correlate with malicious sites. The algorithms we used also allow for categorization of certificates used in the delivery and control of malware. Our analysis shows that there are a number of emerging patterns that even allow for identification of high-jacked devices and self-signed certificates. We present the results of our analysis which show which attributes are the most relevant for detecting malicious SSL certificates and as well the performance of the ML algorithms. Finally, we show how well the training has worked in detecting new malicious sources.

This presentation showcases a real-life use of Machine Learning for the detection of malicious TLS websites. Machine Learning is gaining a lot of popularity for analyzing cyber data and these algorithms have a broad applicability to multiple aspects of cybersecurity. Our aim is to galvanize the community to develop more interesting ways of applying big data analytics in cybersecurity.

Ajit Thyagarajan

Ajit Thyagarajan is an innovative and passionate technologist who explores challenging technology opportunities. He is currently CTO at Atomic Mole, a cybersecurity company developing a simple and effective security solution for the Enterprise. Until recently, he held multiple Director positions at Fidelis Cybersecurity. His area of research is new techniques for the detection of malware using network tools. Prior to Fidelis, he was heavily involved in with Internet Protocols and building fast routers. Ajit also mentors several cybersecurity start-ups as part of Mach37, a Virginia based Cyber security incubator.

Andrew Beard

Andrew Beard is the Lead Software Architect at Atomic Mole. His background is in software development, threat research, and abuse of enterprise grade security products in his home network.


KhanFu - Mobile schedules for INFOSEC conferences.
Mobile interface | Alternate Formats