Covert communications through network configuration messages

被引:10
|
作者
Rios, Ruben [1 ]
Onieva, Jose A. [1 ]
Lopez, Javier [1 ]
机构
[1] Univ Malaga, Network Informat & Comp Secur NICS Lab, E-29071 Malaga, Spain
关键词
System information security; Network security; Covert channels; Information warfare; Intrusion detection; CHANNELS;
D O I
10.1016/j.cose.2013.03.004
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Covert channels are a form of hidden communication that may violate the integrity of systems. Since their birth in Multi-Level Security systems in the early 70's they have evolved considerably, such that new solutions have appeared for computer networks mainly due to vague protocols specifications. In this paper we concentrate on short-range covert channels and analyze the opportunities of concealing data in various extensively used protocols today. From this analysis we observe several features that can be effectively exploited for subliminal data transmission in the Dynamic Host Configuration Protocol (DHCP). The result is a proof-of-concept implementation, HIDE_DHCP, which integrates three different covert channels each of which accommodate to different stealthiness and capacity requirements. Finally, we provide a theoretical and experimental analysis of this tool in terms of its reliability, capacity, and detectability. (C) 2013 Elsevier Ltd. All rights reserved.
引用
收藏
页码:34 / 46
页数:13
相关论文
共 50 条
  • [31] Embedding Covert Information in Broadcast Communications
    Arumugam, Keerthi Suria Kumar
    Bloch, Mathieu R.
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 14 (10) : 2787 - 2801
  • [32] Covert Communications on Poisson Packet Channels
    Soltani, Ramin
    Goeckel, Dennis
    Towsley, Don
    Houmansadr, Amir
    2015 53RD ANNUAL ALLERTON CONFERENCE ON COMMUNICATION, CONTROL, AND COMPUTING (ALLERTON), 2015, : 1046 - 1052
  • [33] A Novel Covert Timing Channel Based on Bitcoin Messages
    Zhu, Liehuang
    Liu, Qi
    Chen, Zhuo
    Zhang, Can
    Gao, Feng
    Yang, Zhongliang
    IEEE TRANSACTIONS ON COMPUTERS, 2023, 72 (10) : 2913 - 2924
  • [34] MESSAGES IN AND MESSAGES THROUGH ART
    NOVITZ, D
    AUSTRALASIAN JOURNAL OF PHILOSOPHY, 1995, 73 (02) : 199 - 203
  • [35] Event prediction in social network through Twitter messages analysis
    Yavari, A.
    Hassanpour, H.
    Cami, B. Rahimpour
    Mahdavi, M.
    SOCIAL NETWORK ANALYSIS AND MINING, 2022, 12 (01)
  • [36] Performance Analysis of a Sound-Based Steganography Wireless Sensor Network to Provide Covert Communications
    Rodriguez-Gomez, Ariadna I.
    Rivero-Angeles, Mario E.
    Flores, Izlian Y. Orea
    Gallegos-Garcia, Gina
    TELECOM, 2024, 5 (03): : 652 - 679
  • [37] Event prediction in social network through Twitter messages analysis
    A. Yavari
    H. Hassanpour
    B. Rahimpour Cami
    M. Mahdavi
    Social Network Analysis and Mining, 2022, 12
  • [38] On covert throughput performance of two-way relay covert wireless communications
    Wu, Huihui
    Zhang, Yuanyu
    Liao, Xuening
    Shen, Yulong
    Jiang, Xiaohong
    WIRELESS NETWORKS, 2020, 26 (05) : 3275 - 3289
  • [39] Relaying IRS-UAV Assisted Covert Communications in Uplink C-NOMA Network
    Qin, Xiaofei
    Na, Zhenyu
    Wen, Zihao
    Wu, Xu
    IEEE COMMUNICATIONS LETTERS, 2024, 28 (09) : 2136 - 2140
  • [40] Improving performance of network covert timing channel through Huffman coding
    Wu, Jingzheng
    Wang, Yongji
    Ding, Liping
    Liao, Xiaofeng
    MATHEMATICAL AND COMPUTER MODELLING, 2012, 55 (1-2) : 69 - 79