Mimic: An active covert channel that evades regularity-based detection
نویسندگان
چکیده
To counter the threat of leaks of sensitive and mission-critical information, high-security facilities employ multi-level security mechanisms in which information flows are prevented from high-security systems to lower-security systems. For networks, this includes the monitoring of all incoming and outgoing traffic, high-grade encryption for all data communication, intrusion detection systems, and rigid enforcement of workstation policies. These measures often make it impossible to leak information by traditional means such as email and file transfer. A covert channel is a communication channel that can be exploited by a process to transfer information in a manner that violates a system’s security policy [1]. An adversary with vested interests can utilize covert channels to leak out information from a secure facility. Ample research is required in understanding and exploring the working of covert channels to develop suitable defenses against them. Covert timing channels (CTC) are a class of advanced covert channels that use the timing difference between two consecutive packets — Inter-Packet Delays (IPDs) — to encode messages. IPDs are a natural characteristic of network traffic and as a result, messages encoded with IPDs make CTCs par-
منابع مشابه
Liquid: A detection-resistant covert timing channel based on IPD shaping
Covert timing channels provide a way to surreptitiously leak information from an entity in a higher-security level to an entity in a lower level. The difficulty of detecting or eliminating such channels makes them a desirable choice for adversaries that value stealth over throughput. When one considers the possibility of such channels transmitting information across network boundaries, the thre...
متن کاملCorrelating Packet Timing with Memory Content Detects IP Covert Timing Channels
We report a novel approach for detecting a hostile process extruding data through a covert timing channel. Our method looks for correlations between the timing of network traffic and bit strings in the address space of the suspicious process. Background Covert leakage of sensitive information from governmental or corporate systems remains a significant threat. Intelligent network gateways can c...
متن کاملPreventing Protocol Switching Covert Channels
Network covert channels enable a policy-breaking network communication (e.g., within botnets). Within the last years, new covert channel techniques arose which are based on the capability of protocol switching. Such protocol switching covert channels operate within overlay networks and can (as a special case) contain their own internal control protocols. We present the first approach to effecti...
متن کاملDesign of Transport Layer Based Hybrid Covert Channel Detection Engine
Computer network is unpredictable due to information warfare and is prone to various attacks. Such attacks on network compromise the most important attribute, the privacy. Most of such attacks are devised using special communication channel called ``Covert Channel''. The word ``Covert'' stands for hidden or non-transparent. Network Covert Channel is a concealed communication path within legitim...
متن کاملPURDUE UNIVERSITY TECHNICAL REPORT Camouflaging Timing Channels in Web Traffic
Web traffic accounts for more than half of Internet traffic today. Camouflaging covert timing channels in Web traffic would be advantageous for concealment. In this paper, we investigate the possibility of disguising network covert timing channels as HTTP traffic to avoid detection. Extensive research has shown that Internet traffic, including HTTP traffic, exhibits self-similarity and long ran...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Computer Networks
دوره 57 شماره
صفحات -
تاریخ انتشار 2013