Covert communications through network configuration messages

被引:10
|
作者
Rios, Ruben [1 ]
Onieva, Jose A. [1 ]
Lopez, Javier [1 ]
机构
[1] Univ Malaga, Network Informat & Comp Secur NICS Lab, E-29071 Malaga, Spain
关键词
System information security; Network security; Covert channels; Information warfare; Intrusion detection; CHANNELS;
D O I
10.1016/j.cose.2013.03.004
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Covert channels are a form of hidden communication that may violate the integrity of systems. Since their birth in Multi-Level Security systems in the early 70's they have evolved considerably, such that new solutions have appeared for computer networks mainly due to vague protocols specifications. In this paper we concentrate on short-range covert channels and analyze the opportunities of concealing data in various extensively used protocols today. From this analysis we observe several features that can be effectively exploited for subliminal data transmission in the Dynamic Host Configuration Protocol (DHCP). The result is a proof-of-concept implementation, HIDE_DHCP, which integrates three different covert channels each of which accommodate to different stealthiness and capacity requirements. Finally, we provide a theoretical and experimental analysis of this tool in terms of its reliability, capacity, and detectability. (C) 2013 Elsevier Ltd. All rights reserved.
引用
收藏
页码:34 / 46
页数:13
相关论文
共 50 条
  • [1] HIDE_DHCP: Covert Communications through Network Configuration Messages
    Rios, Ruben
    Onieva, Jose A.
    Lopez, Javier
    INFORMATION SECURITY AND PRIVACY RESEARCH, 2012, 376 : 162 - 173
  • [2] Overview of covert communications through networks
    Caloyannides, MA
    SENSORS, AND COMMAND, CONTROL, COMMUNICATIONS AND INTELLIGENCE (C31) TECHNOLOGIES FOR HOMELAND DEFENSE AND LAW ENFORCEMENT, 2002, 4708 : 13 - 17
  • [3] Covert Communications through Imperfect Cancellation
    Chew, Daniel
    Nguyen, Christine
    Berhanu, Samuel
    Baumgart, Chris
    Cooper, A. Brinton
    PROCEEDINGS OF THE 2022 ACM WORKSHOP ON INFORMATION HIDING AND MULTIMEDIA SECURITY, IH-MMSEC 2022, 2022, : 63 - 68
  • [4] Covert communications through mobile voice channels
    Kazemi, Reza
    Rezaei, Roohollah
    Akhaee, Mohammad A.
    Behnia, Fereidoon
    IET INFORMATION SECURITY, 2016, 10 (03) : 156 - 164
  • [5] IDENTIFYING COVERT MESSAGES INSIDE AN STEGNOGRAPHIC IMAGE USING NEURAL NETWORK
    Khan, Imran
    Verma, Bhupendra
    ICCNT 2009: PROCEEDINGS OF THE 2009 INTERNATIONAL CONFERENCE ON COMPUTER AND NETWORK TECHNOLOGY, 2010, : 149 - 153
  • [6] IDENTIFYING COVERT MESSAGES INSIDE AN STEGNOGRAPHIC IMAGE USING NEURAL NETWORK
    Khan, Imran
    Verma, Bhupendra
    PROCEEDINGS OF THE 2009 INTERNATIONAL CONFERENCE ON SOFTWARE TECHNOLOGY AND ENGINEERING, 2009, : 230 - 234
  • [7] A Combinatorial Approach to Network Covert Communications with Applications in Web Leaks
    Luo, Xiapu
    Zhou, Peng
    Chan, Edmond W. W.
    Chang, Rocky K. C.
    Lee, Wenke
    2011 IEEE/IFIP 41ST INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS (DSN), 2011, : 474 - 485
  • [8] Robust Network Covert Communications Based on TCP and Enumerative Combinatorics
    Luo, Xiapu
    Chan, Edmond W. W.
    Zhou, Peng
    Chang, Rocky K. C.
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2012, 9 (06) : 890 - 902
  • [9] Covert and Deniable Communications
    Anderson, Ross
    PROCEEDINGS OF THE 6TH ACM WORKSHOP ON INFORMATION HIDING AND MULTIMEDIA SECURITY (IH&MMSEC'18), 2018, : 1 - 1
  • [10] Covert underwater acoustic communications
    Ling, Jun
    He, Hao
    Li, Jian
    Roberts, William
    Stoica, Petre
    JOURNAL OF THE ACOUSTICAL SOCIETY OF AMERICA, 2010, 128 (05): : 2898 - 2909