Pattern-Based Survey and Categorization of Network Covert Channel Techniques

Author:

Wendzel Steffen1,Zander Sebastian2,Fechner Bernhard3,Herdin Christian4

Affiliation:

1. Fraunhofer Institute for Communication, Information Processing and Ergonomics FKIE, Germany

2. Centre for Advanced Internet Architectures, Swinburne University of Technology, Australia

3. Department of Systems and Networking, University of Augsburg, Bavaria, Germany

4. Department of Computer Science, University of Rostock, Germany

Abstract

Network covert channels are used to hide communication inside network protocols. Various techniques for covert channels have arisen in the past few decades. We surveyed and analyzed 109 techniques developed between 1987 and 2013 and show that these techniques can be reduced to only 11 different patterns. Moreover, the majority (69.7%) of techniques can be categorized into only four different patterns (i.e., most techniques we surveyed are similar). We represent the patterns in a hierarchical catalog using a pattern language. Our pattern catalog will serve as a base for future covert channel novelty evaluation. Furthermore, we apply the concept of pattern variations to network covert channels. With pattern variations, the context of a pattern can change. For example, a channel developed for IPv4 can automatically be adapted to other network protocols. We also propose the pattern-based covert channel optimizations pattern hopping and pattern combination. Finally, we lay the foundation for pattern-based countermeasures: whereas many current countermeasures were developed for specific channels, a pattern-oriented approach allows application of one countermeasure to multiple channels. Hence, future countermeasure development can focus on patterns, and the development of real-world protection against covert channels is greatly simplified.

Publisher

Association for Computing Machinery (ACM)

Subject

General Computer Science,Theoretical Computer Science

Reference89 articles.

1. C. Alexander S. Ishikawa and M. Silverstein. 1977. A Pattern Language: Towns Buildings Construction. Oxford University Press New York NY. C. Alexander S. Ishikawa and M. Silverstein. 1977. A Pattern Language: Towns Buildings Construction. Oxford University Press New York NY.

2. V. Berk A. Giani and G. Cybenko. 2005. Detection of Covert Channel Encoding in Network Packet Delays. Technical Report. Department of Computer Science Dartmouth College Hanover NH. V. Berk A. Giani and G. Cybenko. 2005. Detection of Covert Channel Encoding in Network Packet Delays. Technical Report. Department of Computer Science Dartmouth College Hanover NH.

Cited by 113 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. Leveraging Linear Network Error Correction for steganographic network codes;Journal of the Franklin Institute;2024-09

2. Covert communication via blockchain: Hiding patterns and communication patterns;Computer Standards & Interfaces;2024-08

3. A Comprehensive Pattern-based Overview of Stegomalware;Proceedings of the 19th International Conference on Availability, Reliability and Security;2024-07-30

4. No Country for Leaking Containers: Detecting Exfiltration of Secrets Through AI and Syscalls;Proceedings of the 19th International Conference on Availability, Reliability and Security;2024-07-30

5. Robust and Homomorphic Covert Channels in Streams of Numeric Data;Proceedings of the 19th International Conference on Availability, Reliability and Security;2024-07-30

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3