Detecting Covert Channels in Computer Networks Based on Chaos Theory

被引:28
作者
Zhao, Hong [1 ]
Shi, Yun-Qing [2 ]
机构
[1] Fairleigh Dickinson Univ, Teaneck, NJ 07670 USA
[2] New Jersey Inst Technol, Newark, NJ 07102 USA
关键词
Covert channel; network steganalysis; phase space reconstruction; TCP/IP protocols;
D O I
10.1109/TIFS.2012.2231861
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Covert channels via the widely used TCP/IP protocols have become a new challenging issue for network security. In this paper, we analyze the information hiding in TCP/IP protocols and propose a new effective method to detect the existence of hidden information in TCP initial sequence numbers (ISNs), which is known as one of the most difficult covert channels to be detected. Our method uses phase space reconstruction to create a processing space called reconstructed phase space, where a statistical model is proposed for detecting covert channels in TCP ISNs. Based on the model, a classification algorithm is developed to identify the existence of information hidden in ISNs. Simulation results have demonstrated that our proposed detection method outperforms the state-of-the-art technique in terms of high detection accuracy and greatly reduced computational complexity. Instead of offline processing as the state-of-the-art does, our new scheme can be used for online detection.
引用
收藏
页码:273 / 282
页数:10
相关论文
共 37 条
[1]  
Abad C., 2001, IP CHECKSUM COVERT C
[2]  
AHSAN K, 2002, THESIS U TORONTO
[3]   On the limits of steganography [J].
Anderson, RJ ;
Petitcolas, FAP .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 1998, 16 (04) :474-481
[4]  
[Anonymous], PEER REV J INTERNET
[5]  
[Anonymous], P 5 INT WKSP INF HID
[6]  
Attallah S., 1985, 520028STD DOD
[7]   IP Covert Channel Detection [J].
Cabuk, Serdar ;
Brodley, Carla E. ;
Shields, Clay .
ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2009, 12 (04)
[8]  
Dorrendof L., 2009, ACM T INFORM SYST SE, V13, P476
[9]  
Dunbar B., 2002, DETAILED LOOK STEGAN
[10]   SecSyslog: An approach to secure logging based on covert channels [J].
Forte, DV ;
Maruti, C ;
Vetturi, MR ;
Zambelli, M .
FIRST INTERNATIONAL WORKSHOP ON SYSTEMATIC APPROACHES TO DIGITAL FORENSIC ENGINEERING, PROCEEDINGS, 2005, :248-263