ICMPTend: Internet Control Message Protocol Covert Tunnel Attack Intent Detector

被引:0
|
作者
Tu, Tengfei [1 ,2 ]
Yin, Wei [3 ]
Zhang, Hua [1 ,2 ]
Zeng, Xingyu [1 ]
Deng, Xiaoxiang [1 ]
Zhou, Yuchen [1 ]
Liu, Xu [4 ]
机构
[1] Beijing Univ Posts & Telecommun, State Key Lab Networking & Switching Technol, Beijing 100876, Peoples R China
[2] State Key Lab Cryptol, Beijing 100878, Peoples R China
[3] Coordinat Ctr China, Natl Comp Network Emergency Response Tech Team, Beijing 100029, Peoples R China
[4] Penn State Univ, State Coll, PA 16801 USA
来源
CMC-COMPUTERS MATERIALS & CONTINUA | 2022年 / 71卷 / 02期
基金
中国国家自然科学基金;
关键词
Internet control message protocol; support vector machine; covert tunnel; network analysis; CLASSIFICATION; NETWORK;
D O I
10.32604/cmc.2022.022540
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet Control Message Protocol (ICMP) covert tunnel refers to a network attack that encapsulates malicious data in the data part of the ICMP protocol for transmission. Its concealment is stronger and it is not easy to be discovered. Most detection methods are detecting the existence of channels instead of clarifying specific attack intentions. In this paper, we propose an ICMP covert tunnel attack intent detection framework ICMPTend, which includes five steps: data collection, feature dictionary construction, data preprocessing, model construction, and attack intent prediction. ICMPTend can detect a variety of attack intentions, such as shell attacks, sensitive directory access, communication protocol traffic theft, filling tunnel reserved words, and other common network attacks. We extract features from five types of attack intent found in ICMP channels. We build a multi-dimensional dictionary of malicious features, including shell attacks, sensitive directory access, communication protocol traffic theft, filling tunnel reserved words, and other common network attack keywords. For the high-dimensional and independent characteristics of ICMP traffic, we use a support vector machine (SVM) as a multi-class classifier. The experimental results show that the average accuracy of ICMPTend is 92%, training ICMPTend only takes 55 s, and the prediction time is only 2 s, which can effectively identify the attack intention of ICMP.
引用
收藏
页码:2315 / 2331
页数:17
相关论文
共 9 条
  • [1] Analysis and Application of Covert Channels of Internet Control Message Protocol
    ZHOU Xueguang~ 1
    2. College of Electronic Engineering
    [J]. Wuhan University Journal of Natural Sciences, 2006, (06) : 1857 - 1861
  • [2] Covert Message Channels and Attack Vectors for IEEE Precision Time Protocol
    Jacobs, Luke
    DeCusatis, Casimer
    Wojciak, Paul
    Kaiser, Clay
    Guendert, Steve
    [J]. 2022 IEEE INTERNATIONAL SYMPOSIUM ON PRECISION CLOCK SYNCHRONIZATION FOR MEASUREMENT, CONTROL, AND COMMUNICATION (ISPCS), 2022,
  • [3] Shrew attack on Internet Congestion Control Protocol in Control Engineering
    Ma, Jianhong
    Ji, Lixia
    [J]. ADVANCED RESEARCH ON MATERIAL, ENERGY AND CONTROL ENGINEERING, 2013, 648 : 277 - 280
  • [4] A scheme of secret communication using Internet control message protocol
    Suzuki, M
    Matsumoto, T
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2002, E85A (01) : 181 - 189
  • [5] A novel comprehensive steganalysis of transmission control protocol/Internet protocol covert channels based on protocol behaviors and support vector machine
    Shen, Yao
    Huang, Liusheng
    Lu, Xiaorong
    Yang, Wei
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (07) : 1279 - 1290
  • [6] A Security Policy Protocol for Detection and Prevention of Internet Control Message Protocol Attacks in Software Defined Networks
    Onyema, Edeh Michael
    Kumar, M. Anand
    Balasubaramanian, Sundaravadivazhagn
    Bharany, Salil
    Rehman, Ateeq Ur
    Eldin, Elsayed Tag
    Shafiq, Muhammad
    [J]. SUSTAINABILITY, 2022, 14 (19)
  • [7] Implementation of Hybrid Artificial Intelligence Technique to Detect Covert Channels Attack in New Generation Internet Protocol IPv6
    Salih, Abdulrahman
    Ma, Xiaoqi
    Peytchev, Evtim
    [J]. LEADERSHIP, INNOVATION AND ENTREPRENEURSHIP AS DRIVING FORCES OF THE GLOBAL ECONOMY, 2017, : 173 - 190
  • [8] Multi-channel attack detection based on lightweight message authentication code access control using Internet of Things design
    Kumar, Ravula Arun
    Vinuthna, Kambalapally
    [J]. TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2022, 33 (07)
  • [9] Labelled Dataset on Distributed Denial-of-Service (DDoS) Attacks Based on Internet Control Message Protocol Version 6 (ICMPv6)
    Manickam, Selvakumar
    AIghuraibawi, Adnan Hasan Bdair
    Abdullah, Rosni
    Alyasseri, Zaid Abdi Alkareem
    Abdulkareem, Karrar Hameed
    Mohammed, Mazin Abed
    Alani, Ayman
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022