IP Covert Channel Detection

Author:

Cabuk Serdar1,Brodley Carla E.2,Shields Clay3

Affiliation:

1. Hewlett-Packard Laboratories

2. Tufts University

3. Georgetown University

Abstract

A covert channel can occur when an attacker finds and exploits a shared resource that is not designed to be a communication mechanism. A network covert channel operates by altering the timing of otherwise legitimate network traffic so that the arrival times of packets encode confidential data that an attacker wants to exfiltrate from a secure area from which she has no other means of communication. In this article, we present the first public implementation of an IP covert channel, discuss the subtle issues that arose in its design, and present a discussion on its efficacy. We then show that an IP covert channel can be differentiated from legitimate channels and present new detection measures that provide detection rates over 95%. We next take the simple step an attacker would of adding noise to the channel to attempt to conceal the covert communication. For these noisy IP covert timing channels, we show that our online detection measures can fail to identify the covert channel for noise levels higher than 10%. We then provide effective offline search mechanisms that identify the noisy channels.

Publisher

Association for Computing Machinery (ACM)

Subject

Safety, Risk, Reliability and Quality,General Computer Science

Reference58 articles.

1. Abad C. 2001. IP checksum covert channels and selected hash collision. Tech. rep. University of California. Abad C. 2001. IP checksum covert channels and selected hash collision. Tech. rep. University of California.

2. Ahsan K. 2000. Covert channel analysis and data hiding in TCP/IP. M.S. thesis University of Toronto. Ahsan K. 2000. Covert channel analysis and data hiding in TCP/IP. M.S. thesis University of Toronto.

3. Analyzing stability in wide-area network performance

4. New covert channels in HTTP

Cited by 86 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. A Case Study on the Detection of Hash-Chain-based Covert Channels Using Heuristics and Machine Learning;Proceedings of the 19th International Conference on Availability, Reliability and Security;2024-07-30

2. Press play, install malware: a study of rhythm game-based malware dropping;International Journal of Information Security;2024-07-29

3. A generalized detection framework for covert timing channels based on perceptual hashing;Transactions on Emerging Telecommunications Technologies;2024-05

4. Enhanced Detection of Thermal Covert Channel Attacks in Multicore Processors;2024 25th International Symposium on Quality Electronic Design (ISQED);2024-04-03

5. Using Machine Learning to Detect Hidden Information Through Steganographic Techniques in the TCP/IP Network Protocols;Lecture Notes in Networks and Systems;2024

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3