A Survey on TLS-Encrypted Malware Network Traffic Analysis Applicable to Security Operations Centers

Recently, a majority of security operations centers (SOCs) have been facing a critical issue of increased adoption of transport layer security (TLS) encryption on the Internet, in network traffic analysis (NTA). To this end, in this survey article, we present existing research on NTA and related are...

Full description

Bibliographic Details
Main Authors: Chaeyeon Oh, Joonseo Ha, Heejun Roh
Format: Article
Language:English
Published: MDPI AG 2021-12-01
Series:Applied Sciences
Subjects:
Online Access:https://www.mdpi.com/2076-3417/12/1/155
_version_ 1797499651928096768
author Chaeyeon Oh
Joonseo Ha
Heejun Roh
author_facet Chaeyeon Oh
Joonseo Ha
Heejun Roh
author_sort Chaeyeon Oh
collection DOAJ
description Recently, a majority of security operations centers (SOCs) have been facing a critical issue of increased adoption of transport layer security (TLS) encryption on the Internet, in network traffic analysis (NTA). To this end, in this survey article, we present existing research on NTA and related areas, primarily focusing on TLS-encrypted traffic to detect and classify malicious traffic with deployment scenarios for SOCs. Security experts in SOCs and researchers in academia can obtain useful information from our survey, as the main focus of our survey is NTA methods applicable to malware detection and family classification. Especially, we have discussed pros and cons of three main deployment models for encrypted NTA: TLS interception, inspection using cryptographic functions, and passive inspection without decryption. In addition, we have discussed the state-of-the-art methods in TLS-encrypted NTA for each component of a machine learning pipeline, typically used in the state-of-the-art methods.
first_indexed 2024-03-10T03:50:29Z
format Article
id doaj.art-a24c30eff77e48f89024c62f2c0bbb4b
institution Directory Open Access Journal
issn 2076-3417
language English
last_indexed 2024-03-10T03:50:29Z
publishDate 2021-12-01
publisher MDPI AG
record_format Article
series Applied Sciences
spelling doaj.art-a24c30eff77e48f89024c62f2c0bbb4b2023-11-23T11:08:33ZengMDPI AGApplied Sciences2076-34172021-12-0112115510.3390/app12010155A Survey on TLS-Encrypted Malware Network Traffic Analysis Applicable to Security Operations CentersChaeyeon Oh0Joonseo Ha1Heejun Roh2Department of Cyber Security, Graduate School, Korea University, Sejong 30019, KoreaCyber Security Major, Division of Applied Mathematical Sciences, Korea University Sejong Campus, Sejong 30019, KoreaDepartment of Cyber Security, Graduate School, Korea University, Sejong 30019, KoreaRecently, a majority of security operations centers (SOCs) have been facing a critical issue of increased adoption of transport layer security (TLS) encryption on the Internet, in network traffic analysis (NTA). To this end, in this survey article, we present existing research on NTA and related areas, primarily focusing on TLS-encrypted traffic to detect and classify malicious traffic with deployment scenarios for SOCs. Security experts in SOCs and researchers in academia can obtain useful information from our survey, as the main focus of our survey is NTA methods applicable to malware detection and family classification. Especially, we have discussed pros and cons of three main deployment models for encrypted NTA: TLS interception, inspection using cryptographic functions, and passive inspection without decryption. In addition, we have discussed the state-of-the-art methods in TLS-encrypted NTA for each component of a machine learning pipeline, typically used in the state-of-the-art methods.https://www.mdpi.com/2076-3417/12/1/155network traffic analysistraffic classificationsecurity operations centertransport layer securitymalware
spellingShingle Chaeyeon Oh
Joonseo Ha
Heejun Roh
A Survey on TLS-Encrypted Malware Network Traffic Analysis Applicable to Security Operations Centers
Applied Sciences
network traffic analysis
traffic classification
security operations center
transport layer security
malware
title A Survey on TLS-Encrypted Malware Network Traffic Analysis Applicable to Security Operations Centers
title_full A Survey on TLS-Encrypted Malware Network Traffic Analysis Applicable to Security Operations Centers
title_fullStr A Survey on TLS-Encrypted Malware Network Traffic Analysis Applicable to Security Operations Centers
title_full_unstemmed A Survey on TLS-Encrypted Malware Network Traffic Analysis Applicable to Security Operations Centers
title_short A Survey on TLS-Encrypted Malware Network Traffic Analysis Applicable to Security Operations Centers
title_sort survey on tls encrypted malware network traffic analysis applicable to security operations centers
topic network traffic analysis
traffic classification
security operations center
transport layer security
malware
url https://www.mdpi.com/2076-3417/12/1/155
work_keys_str_mv AT chaeyeonoh asurveyontlsencryptedmalwarenetworktrafficanalysisapplicabletosecurityoperationscenters
AT joonseoha asurveyontlsencryptedmalwarenetworktrafficanalysisapplicabletosecurityoperationscenters
AT heejunroh asurveyontlsencryptedmalwarenetworktrafficanalysisapplicabletosecurityoperationscenters
AT chaeyeonoh surveyontlsencryptedmalwarenetworktrafficanalysisapplicabletosecurityoperationscenters
AT joonseoha surveyontlsencryptedmalwarenetworktrafficanalysisapplicabletosecurityoperationscenters
AT heejunroh surveyontlsencryptedmalwarenetworktrafficanalysisapplicabletosecurityoperationscenters