Detection of TCP covert channel based on Markov model

被引:7
|
作者
Zhai, Jiangtao [1 ]
Liu, Guangjie [1 ]
Dai, Yuewei [1 ]
机构
[1] Nanjing Univ Sci & Technol, Sch Automat, Nanjing 210094, Jiangsu, Peoples R China
关键词
TCP covert channel; Markov model; Covert channel detection; MAP;
D O I
10.1007/s11235-013-9737-7
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Network covert channel is a covert communication method by hiding covert messages into overt network packets. In recent years, with the development of various hiding methods, network covert channel has become a new kind of threat for network security. The covert channel that uses the redundancies existing in TCP protocol to make hiding is called TCP covert channel. In this paper, the behaviors of TCP flows are modeled by the Markov chain composed of the states of TCP packets. And the abnormality caused by TCP covert channel is described by the difference between the overt and covert TCP transition probability matrix. The detection method based on MAP is proposed to detect the covert communication hidden in TCP flows under various applications such as HTTP, FTP, TELNET, SSH and SMTP. Experiments show that the proposed algorithm achieves better detection performance than the existing methods.
引用
收藏
页码:333 / 343
页数:11
相关论文
共 50 条
  • [21] Covert Timing Channel Detection Method Based on Random Forest Algorithm
    Fu, Guangxin
    Li, Qingbao
    Zhang, Ping
    Chen, Zhifeng
    2017 17TH IEEE INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY (ICCT 2017), 2017, : 165 - 171
  • [22] Detection approach for covert channel based on concurrency conflict interval time
    Wang, Yongji
    Wu, Jingzheng
    Ding, Liping
    Zeng, Haitao
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2011, 48 (08): : 1542 - 1553
  • [23] Detection and Parameter Estimation for Jitterbug Covert Channel Based on Coefficient of Variation
    Wang, Hao
    Liu, Guangjie
    Zhai, Jiangtao
    Dai, Yuewei
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2016, 10 (04): : 1927 - 1943
  • [24] Support vector machine based ICMP covert channel attack detection
    Sohn, T
    Noh, T
    Moon, J
    COMPUTER NETWORK SECURITY, 2003, 2776 : 461 - 464
  • [25] DGA and DNS Covert Channel Detection System based on Machine Learning
    Wang, Zhiqiang
    Dong, Hongyu
    Chi, Yaping
    Zhang, Jianyi
    Yang, Tao
    Liu, Qixu
    PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND APPLICATION ENGINEERING (CSAE2019), 2019,
  • [26] An Intrusion Detection Based on Markov Model
    Li, Haisheng
    COMPUTATIONAL MATERIALS SCIENCE, PTS 1-3, 2011, 268-270 : 988 - 993
  • [27] Network Storage Covert Channel Detection Based on Data Joint Analysis
    Fu, Guangxin
    Li, Qingbao
    Chen, Zhifeng
    Zeng, Guangyu
    Gu, Juanjuan
    CLOUD COMPUTING AND SECURITY, PT IV, 2018, 11066 : 346 - 357
  • [28] Mimic: An active covert channel that evades regularity-based detection
    Kothari, Kush
    Wright, Matthew
    COMPUTER NETWORKS, 2013, 57 (03) : 647 - 657
  • [29] covert channel detection based on scale-free networks theory
    Lan, Li
    Xia Linglin
    Wei Wenhong
    SECOND INTERNATIONAL SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND DESIGN, VOL 1, PROCEEDINGS, 2009, : 378 - 380
  • [30] Information transmission model for covert channel
    Yao, Li-Hong
    Zi, Xiao-Chao
    Li, Jian-Hua
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2008, 36 (11): : 2216 - 2219