SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact UsMalware is evolving to use encryption techniques to obfuscate network communication to evade detection. This paper analyzes anomalies within network traffic generated by Gameover Zeus. The anomalies result from the encryption methods used to obfuscate network communications. However, even though the anomalies can be seen when manually inspecting the network packets, the obfuscation techniques pose difficulties when attempting to use signature based Intrusion Detection Systems (IDS) for detection. While the anomalies may not be useful for constructing IDS signatures, they may be useful in constructing custom detection algorithms.