Covert Network Detection

نویسندگان

  • Steven T. Smith
  • Kenneth D. Senne
  • Scott Philips
  • Edward K. Kao
  • Garrett Bernstein
چکیده

Network analysis has been a major research area over the last ten years, driven by interest in biological networks, cyber attacks, social networks, and criminal or terrorist organizations. This range of applications is illustrated in Figure 1. Detection of a covert community is most likely to be effective if the community exhibits high levels of connection activity. However, the covert networks of interest to many applications are unlikely to cooperate with this optimistic assumption. Indeed, a " fully connected network is an unlikely description of the enemy insurgent order of battle [1]. " A clandestine or covert community is more likely to appear cellular and distributed [2]. Communities of this type can be represented with " small world " models [3]. The covert networks of interest in this paper exist to accomplish nefarious, illegal, or terrorist goals while " hiding in plain sight [4, 5]. " Covert networks necessarily adopt operational procedures to remain hidden and robustly adapt to losses of parts of the network. For example, during the Alge-rian Revolution, the National Liberation Front's (FLN) Autonomous Zone of Algiers (ZAA) military command was ''carefully kept apart from other elements of the organization, the network was broken down into a number of quite distinct and compartmented branches, in communication only with the network chief, " allowing ZAA leader Yassef Saadi to command " within 200 yards from the office of the [French] army commandant... and remain there several months [6]. " Valdis Krebs' reconstruction of the 11 September 2001 terrorist network details the strategy for keeping cell members distant from each other and from other cells, and notes Osama Covert network detection is an important capability in areas of applied research in which the data of interest can be represented as a relatively small subgraph in an enormous, potentially uninteresting background. This aspect characterizes covert network detection as a " Big Data " problem. In this article, a new Bayesian network detection framework is introduced that partitions the graph on the basis of prior information and direct observations. We also explore a new generative stochastic model for covert networks and analyze the detection performance of both classes of optimal detection techniques.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Effective Covert Timing Channels Detection: Support Vector Machine & Hyperbolic Hopfield Neural Network

A network covert channel is a mechanism that can be used to leak information across a network in violation of a security policy and in a manner that can be difficult to detect. Detecting and preventing covert channels is particularly important for multilevel security systems in which processes working with classified information may leak information to processes with a lower classification leve...

متن کامل

A Detection Method for Cloak Covert Channel Based on Distribution of TCP Burst Size

Cloak is a new class of network covert timing channel relied on multilink with high reliability and enhanced data rate. The existing detection schemes are less effective to detect this kind of covert channel. In this paper, the detection method for Cloak covert channel based on burst size distribution is proposed. The statistical distribution of burst size is calculated and Chi-Squared test is ...

متن کامل

Network Packet Length Covert Channel Based on Empirical Distribution Function

Network packet length covert channel modulates secret message bits onto the packet lengths to transmit secret messages. In this paper, a novel network packet length covert channel is proposed. The proposed scheme is based on the empirical distribution function of packet length series of legitimate traffic. Different from the existing schemes, the lengths of packets which are generated by the co...

متن کامل

Entropy Based Detection And Behavioral Analysis Of Hybrid Covert Channeling Secured Communication

Covert channels is a vital setup in the analysing the strength of security in a network. Covert Channel is illegitimate channelling over the secured channel and establishes a malicious conversation. The trap-door set in such channels proliferates making covert channel sophisticated to detect their presence in network firewall. This is due to the intricate covert scheme that enables to build rob...

متن کامل

Design of Transport Layer Based Hybrid Covert Channel Detection Engine

Computer network is unpredictable due to information warfare and is prone to various attacks. Such attacks on network compromise the most important attribute, the privacy. Most of such attacks are devised using special communication channel called ``Covert Channel''. The word ``Covert'' stands for hidden or non-transparent. Network Covert Channel is a concealed communication path within legitim...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013