Passer à la navigation principale Passer à la recherche Passer au contenu principal

Striking Back at Cobalt: Using Network Traffic Metadata to Detect Cobalt Strike Masquerading Command and Control Channels

Résultats de recherche: Le chapitre dans un livre, un rapport, une anthologie ou une collectionContribution à une conférenceRevue par des pairs

Résumé

Off-the-shelf software for Command and Control is often used by attackers and legitimate pentesters looking for discretion. Among other functionalities, these tools facilitate the customization of their network traffic so it can mimic popular websites, thereby increasing their secrecy. Cobalt Strike is one of the most famous solutions in this category, used by known advanced attacker groups such as “Mustang Panda” or “Nobelium”. In response to these threats, Security Operation Centers and other defense actors struggle to detect Command and Control traffic, which often use encryption protocols such as TLS. Network traffic metadata-based machine learning approaches have been proposed to detect encrypted malware communications or fingerprint websites over Tor network. This paper presents a machine learning-based method to detect Cobalt Strike Command and Control activity based only on widely used network traffic metadata. The proposed method is, to the best of our knowledge, the first of its kind that is able to adapt the model it uses to the observed traffic to optimize its performance. This specificity permits our method to performs equally or better than the state of the art while using standard features thus easier to use in a production environment and more explainable.

langue originaleAnglais
titreAvailability, Reliability and Security - 20th International Conference, ARES 2025, Proceedings
rédacteurs en chefMila Dalla Preda, Sebastian Schrittwieser, Vincent Naessens, Bjorn De Sutter
EditeurSpringer Science and Business Media Deutschland GmbH
Pages163-185
Nombre de pages23
ISBN (imprimé)9783032006233
Les DOIs
étatPublié - 1 janv. 2025
Evénement20th International Conference on Availability, Reliability and Security, ARES 2025 - Ghent, Belgique
Durée: 11 août 202514 août 2025

Série de publications

NomLecture Notes in Computer Science
Volume15992 LNCS
ISSN (imprimé)0302-9743
ISSN (Electronique)1611-3349

Une conférence

Une conférence20th International Conference on Availability, Reliability and Security, ARES 2025
Pays/TerritoireBelgique
La villeGhent
période11/08/2514/08/25

Empreinte digitale

Examiner les sujets de recherche de « Striking Back at Cobalt: Using Network Traffic Metadata to Detect Cobalt Strike Masquerading Command and Control Channels ». Ensemble, ils forment une empreinte digitale unique.

Contient cette citation