Experimental Validation of a Command and Control Traffic Detection Model
Journal Article
·
· IEEE Transactions on Dependable and Secure Computing
- Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)
Network intrusion detection systems (NIDS) are commonly used to detect malware communications, including command-and-control (C2) traffic from botnets. NIDS performance assessments have been studied for decades, but mathematical modeling has rarely been used to explore NIDS performance. This paper details a mathematical model that describes a NIDS performing packet inspection and its detection of malware's C2 traffic. Here, the paper further describes an emulation testbed and a set of cyber experiments that used the testbed to validate the model. These experiments included a commonly used NIDS (Snort) and traffic with contents from a pervasive malware (Emotet). Results are presented for two scenarios: a nominal scenario and a “stressed” scenario in which the NIDS cannot process all incoming packets. Model and experiment results match well, with model estimates mostly falling within 95 % confidence intervals on the experiment means. Model results were produced 70-3000 times faster than the experimental results. Consequently, the model's predictive capability could potentially be used to support decisions about NIDS configuration and effectiveness that require high confidence results, quantification of uncertainty, and exploration of large parameter spaces. Furthermore, the experiments provide an example for how emulation testbeds can be used to validate cyber models that include stochastic variability.
- Research Organization:
- Sandia National Laboratories (SNL-NM), Albuquerque, NM (United States)
- Sponsoring Organization:
- USDOE Laboratory Directed Research and Development (LDRD) Program; USDOE National Nuclear Security Administration (NNSA)
- Grant/Contract Number:
- NA0003525
- OSTI ID:
- 2311734
- Report Number(s):
- SAND--2023-03830J
- Journal Information:
- IEEE Transactions on Dependable and Secure Computing, Journal Name: IEEE Transactions on Dependable and Secure Computing Journal Issue: 3 Vol. 21; ISSN 1545-5971
- Publisher:
- IEEECopyright Statement
- Country of Publication:
- United States
- Language:
- English
Similar Records
Botnet behaviour analysis: How would a data analytics-based system with minimum a priori information perform?
A hardware-in-the-loop (HIL) testbed for cyber-physical energy systems in smart commercial buildings
Evaluation of Anomaly Detection for Wide-Area Protection Using Cyber Federation Testbed
Journal Article
·
Mon May 08 20:00:00 EDT 2017
· International Journal of Network Management
·
OSTI ID:1543482
A hardware-in-the-loop (HIL) testbed for cyber-physical energy systems in smart commercial buildings
Journal Article
·
Sun Apr 14 20:00:00 EDT 2024
· Science and Technology for the Built Environment
·
OSTI ID:2567485
Evaluation of Anomaly Detection for Wide-Area Protection Using Cyber Federation Testbed
Conference
·
Thu Aug 01 00:00:00 EDT 2019
· 2019 IEEE Power & Energy Society General Meeting (PESGM)
·
OSTI ID:1985673