Correlating Packet Timing with Memory Content Detects IP Covert Timing Channels

نویسنده

  • Richard M. Stillman
چکیده

We report a novel approach for detecting a hostile process extruding data through a covert timing channel. Our method looks for correlations between the timing of network traffic and bit strings in the address space of the suspicious process. Background Covert leakage of sensitive information from governmental or corporate systems remains a significant threat. Intelligent network gateways can close covert storage channels, but covert timing channels are notoriously challenging to prevent. Measures that impede covert communication also slow all other outbound traffic. Current detection technology relies upon discerning the underlying regularity that must be present in the packet interarrival times (PIATs) in order for the channel to carry information. Unfortunately, it is not hard for a determined adversary to defeat detection by obfuscating the distribution of PIATs. In the work reported here, we present a new technique that combines analysis of the PIATS with string matching to data in the address space of the target process. This approach overcomes the limitations of purely statistical PIAT analysis. Experiments and Results We created a trojan process that uses an IP covert timing channel, and then tested our ability to detect it in a local area network. First, we used three published detection methods, then we implemented an entropy-based detector, and then we applied the PIAT-memory correlation approach. Efficacy of published detection algorithms By configuring the trojan to inject increasing amounts of noise within the channel, detection using the histogram approach of Borders and Prakash [2], the covert channel ratio Cμ Cmax of Berk et al [1], and the 2–similarity metric of Cabuk et al [4] were all defeated. Entropy-based detection Browne [3] theorized that if we could accurately measure the entropy of a system’s output and find that it falls short of predicted entropy, then there must be a covert process that is imposing order upon the output. We implemented this ∗Author’s mailing address: 6574 N. State Road 7, #286, Coconut Creek, FL 33073 0.0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1.0 0.0 0.2 0.4 0.6 0.8 1.0 Noise E n tr o p y R at io

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Methods of IPD normalization to counteract IP timing covert channels

Covert channels are used for information transmission in a manner that is not intended for communication and is difficult to detect. We propose a technique to prevent the information leakage via IP covert timing channels by inter-packet delays normalization in the process of packets sending. Recommendations for using the counteraction methods and choosing parameters were given. The advantage of...

متن کامل

طراحی و ارزیابی روش کدگذاری ترکیبی برای کانال پوششی زمانبندی‌دار در شبکه اینترنت

Covert channel means communicating information through covering of overt and authorized channel in a manner that existence of channel to be hidden. In network covert timing channels that use timing features of transmission packets to modulating covert information, the appropriate encoding schema is very important. In this paper, a hybrid encoding schema proposed through combining "the inter-pac...

متن کامل

Stealthier Inter-packet Timing Covert Channels

Covert channels aim to hide the existence of communication. Recently proposed packet-timing channels encode covert data in inter-packet times, based on models of inter-packet times of normal traffic. These channels are detectable if normal inter-packet times are not independent identically-distributed, which we demonstrate is the case for several network applications. We show that ~80% of chann...

متن کامل

Detection of Covert Channel Encoding in Network Packet Delays

Covert channels are mechanisms for communicating information in ways that are difficult to detect. Data exfiltration can be an indication that a computer has been compromised by an attacker even when other intrusion detection schemes have failed to detect a successful attack. Covert timing channels use packet interarrival times, not header or payload embedded information, to encode covert messa...

متن کامل

Robust and Undetectable Covert Timing Channels for i.i.d. Traffic

Covert timing channels exploit inter-packet delays in network traffic to transmit secret messages. The two most important design goals are undetectability (the covert channel has to remain hidden to a potential adversary that is monitoring the inter-packet delay pattern) and robustness (messages can be decoded correctly even in presence of (maliciously) injected noise). In previous proposals un...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007