Covert Network Detection
نویسندگان
چکیده
Network analysis has been a major research area over the last ten years, driven by interest in biological networks, cyber attacks, social networks, and criminal or terrorist organizations. This range of applications is illustrated in Figure 1. Detection of a covert community is most likely to be effective if the community exhibits high levels of connection activity. However, the covert networks of interest to many applications are unlikely to cooperate with this optimistic assumption. Indeed, a " fully connected network is an unlikely description of the enemy insurgent order of battle [1]. " A clandestine or covert community is more likely to appear cellular and distributed [2]. Communities of this type can be represented with " small world " models [3]. The covert networks of interest in this paper exist to accomplish nefarious, illegal, or terrorist goals while " hiding in plain sight [4, 5]. " Covert networks necessarily adopt operational procedures to remain hidden and robustly adapt to losses of parts of the network. For example, during the Alge-rian Revolution, the National Liberation Front's (FLN) Autonomous Zone of Algiers (ZAA) military command was ''carefully kept apart from other elements of the organization, the network was broken down into a number of quite distinct and compartmented branches, in communication only with the network chief, " allowing ZAA leader Yassef Saadi to command " within 200 yards from the office of the [French] army commandant... and remain there several months [6]. " Valdis Krebs' reconstruction of the 11 September 2001 terrorist network details the strategy for keeping cell members distant from each other and from other cells, and notes Osama Covert network detection is an important capability in areas of applied research in which the data of interest can be represented as a relatively small subgraph in an enormous, potentially uninteresting background. This aspect characterizes covert network detection as a " Big Data " problem. In this article, a new Bayesian network detection framework is introduced that partitions the graph on the basis of prior information and direct observations. We also explore a new generative stochastic model for covert networks and analyze the detection performance of both classes of optimal detection techniques.
منابع مشابه
An Effective Covert Timing Channels Detection: Support Vector Machine & Hyperbolic Hopfield Neural Network
A network covert channel is a mechanism that can be used to leak information across a network in violation of a security policy and in a manner that can be difficult to detect. Detecting and preventing covert channels is particularly important for multilevel security systems in which processes working with classified information may leak information to processes with a lower classification leve...
متن کاملA Detection Method for Cloak Covert Channel Based on Distribution of TCP Burst Size
Cloak is a new class of network covert timing channel relied on multilink with high reliability and enhanced data rate. The existing detection schemes are less effective to detect this kind of covert channel. In this paper, the detection method for Cloak covert channel based on burst size distribution is proposed. The statistical distribution of burst size is calculated and Chi-Squared test is ...
متن کاملNetwork Packet Length Covert Channel Based on Empirical Distribution Function
Network packet length covert channel modulates secret message bits onto the packet lengths to transmit secret messages. In this paper, a novel network packet length covert channel is proposed. The proposed scheme is based on the empirical distribution function of packet length series of legitimate traffic. Different from the existing schemes, the lengths of packets which are generated by the co...
متن کاملEntropy Based Detection And Behavioral Analysis Of Hybrid Covert Channeling Secured Communication
Covert channels is a vital setup in the analysing the strength of security in a network. Covert Channel is illegitimate channelling over the secured channel and establishes a malicious conversation. The trap-door set in such channels proliferates making covert channel sophisticated to detect their presence in network firewall. This is due to the intricate covert scheme that enables to build rob...
متن کاملDesign of Transport Layer Based Hybrid Covert Channel Detection Engine
Computer network is unpredictable due to information warfare and is prone to various attacks. Such attacks on network compromise the most important attribute, the privacy. Most of such attacks are devised using special communication channel called ``Covert Channel''. The word ``Covert'' stands for hidden or non-transparent. Network Covert Channel is a concealed communication path within legitim...
متن کامل