Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
article

Covert channel-internal control protocols: attacks and defense

Published: 01 October 2016 Publication History

Abstract

Network covert channels have become a sophisticated means for transferring hidden information over the network. Covert channel-internal control protocols, also called micro protocols, have been introduced in the recent years to enhance capabilities of the network covert channels. Micro protocols are usually placed within the hidden bits of a covert channel's payload and enable features such as reliable data transfer, session management, and dynamic routing for network covert channels. These features provide adaptive and stealthy covert communication channels. Some of the micro protocol based tools exhibit vulnerabilities and are susceptible to attacks. In this paper, we demonstrate some possible attacks on micro protocols, which are capable of breaking the sophisticated covert channel communication or jeopardizing the identity of peers in such a network. These attacks are based on the attacker's interaction with the micro protocol. We also present the defense techniques to safeguard micro protocols against such attacks. By using these techniques, micro protocol-based tools can become immune to certain attacks and lead to robust covert communication. We present our results for two micro protocol-based tools: Ping Tunnel and smart covert channel tool. Copyright © 2016 John Wiley & Sons, Ltd.

References

[1]
Lampson BW. A note on the confinement problem. Communications of the ACM. 1973; Volume 16 Issue 10: pp.613-615.
[2]
Zander S, Armitage G, Branch P. Covert channels and countermeasures in computer network protocols. IEEE Communications Magazine. 2007; Volume 45 Issue 12: pp.136-142.
[3]
Zielnska E, Mazurczyk W, Szczypiorski K. Trends in Steganography. Communications of the ACM. 2014; Volume 57 Issue 3: pp.86-95.
[4]
Halopeau B. Terrorist use of the Internet. In Cyber Crime and Cyber Terrorism Investigator's Handbook, Akhgar B, Staniforth A, Bosco F ¿eds. Syngress: Waltham, MA, USA, 2014; pp.123-132.
[5]
Department of Defense. Trusted computer system evaluation criteria TCSEC, Aug 1985.
[6]
Wendzel S, Keller J. Low-attention forwarding for mobile network covert channels. In Proc. 12th Int. Conference on Communications and Multimedia Security CMS 2011, ser. LNCS, vol.¿7025. Springer: Berlin, Heidelberg, 2011; pp.122-133.
[7]
Wendzel S, Keller J. Hidden and under control - a survey and outlook on covert channel-internal control protocols. Annals of Telecommunications. 2014; Volume 69 Issue 7: pp.417-430.
[8]
Stødle D. Ping tunnel - for those times when everything else is blocked, 2009. Available from: http://www.cs.uit.no/ daniels/PingTunnel/ {Accessed on October 20, 2015}.
[9]
Mazurczyk W, Kotulski Z. New security and control protocol for VoIP based on steganography and digital watermarking. In Annales UMCS, Informatica, AI 5, 2006; pp.417-426.
[10]
Wendzel S, Keller J. Systematic engineering of control protocols for covert channels. In Proc. 13th Int. Conference on Communications and Multimedia Security CMS 2012, ser. LNCS, vol.¿7394. Springer: Berlin, Heidelberg, 2012; pp.131-144.
[11]
Backs P, Wendzel S, Keller J. Dynamic routing in covert channel overlays based on control protocols. In Proc. International Workshop on Information Security, Theory and Practice ISTP-2012. IEEE: Los Alamitos, CA, USA, 2012; pp.32-39.
[12]
Handel M, Paxson V, Kreibich C. Network intrusion detection: evasion, traffic normalization, and end-to-end protocol semantics. In Proc. 10th USENIX Security Symposium: Berkeley, CA, USA, 2001; pp.115-131.
[13]
Tcpdump website. 2014. Available from: http://www.tcpdump.org/, {last access: Oct-20-2015}.
[14]
Graphviz website, 2014. Available from: http://www.graphviz.org/, {last access: Oct-20-2015.}
[15]
Iptables website, 2014. Available from: http://www.netfilter.org/projects/iptables/, {last access: Oct-20-2015}.
[16]
Nfqueue webpage. 2008. Available from: http://www.iptables.info/en/iptables-targets-and-jumps.html, {last access: Oct-20-2015}.
[17]
Sohn T, Moon J, Lee S, Lee D, Lim J. Covert channel detection in the ICMP payload using support vector machine. In Computer and Information Sciences - ISCIS 2003, ser. LNCS, vol.¿2869. Springer: Berlin Heidelberg, 2003; pp.828-835.
[18]
Fraczek W, Mazurczyk W, Szczypiorski K. Multilevel steganography: improving hidden communication in networks. Journal of Universal Computer Science. 2012; Volume 18 Issue 14: pp.1967-1986.

Cited By

View all
  • (2021)Study of the Error Detection and Correction Scheme for Distributed Network Covert ChannelsProceedings of the 16th International Conference on Availability, Reliability and Security10.1145/3465481.3470087(1-8)Online publication date: 17-Aug-2021
  • (2020)Covert Channels in Transport Layer SecurityProceedings of the 2020 European Interdisciplinary Cybersecurity Conference10.1145/3424954.3424962(1-6)Online publication date: 18-Nov-2020
  1. Covert channel-internal control protocols: attacks and defense

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image Security and Communication Networks
      Security and Communication Networks  Volume 9, Issue 15
      October 2016
      468 pages
      ISSN:1939-0114
      EISSN:1939-0122
      Issue’s Table of Contents

      Publisher

      John Wiley & Sons, Inc.

      United States

      Publication History

      Published: 01 October 2016

      Author Tags

      1. ICMP tunneling
      2. Ping Tunnel
      3. active warden
      4. covert channels
      5. information hiding
      6. micro protocols
      7. network security
      8. overlay routing
      9. passive warden
      10. steganography

      Qualifiers

      • Article

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)0
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 01 Nov 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2021)Study of the Error Detection and Correction Scheme for Distributed Network Covert ChannelsProceedings of the 16th International Conference on Availability, Reliability and Security10.1145/3465481.3470087(1-8)Online publication date: 17-Aug-2021
      • (2020)Covert Channels in Transport Layer SecurityProceedings of the 2020 European Interdisciplinary Cybersecurity Conference10.1145/3424954.3424962(1-6)Online publication date: 18-Nov-2020

      View Options

      View options

      Get Access

      Login options

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media