Detection of Covert Channels over ICMP Protocol

被引:5
|
作者
Sayadi, Sirine [1 ]
Abbes, Tarek [1 ]
Bouhoula, Adel [2 ]
机构
[1] Univ Sfax, Natl Sch Elect & Telecommun Sfax, Sfax, Tunisia
[2] Higher Sch Commun Tunis, Cite El Ghazala 2083, Tunisia
来源
2017 IEEE/ACS 14TH INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS (AICCSA) | 2017年
关键词
Network Security; Covert Channel; Storage Channel; Traffic analysis; ICMP protocol; ICMP Tunneling; Tunneling Detection;
D O I
10.1109/AICCSA.2017.60
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the growing complexity of networks and communications protocols that become increasingly enormous and extensive, we are confronted with the problem of covert channel that affects the confidentiality and integrity of data sent in the network. Covert channels also known as hidden channels can elude basic security systems such as Intrusion Detection Systems (IDS) and firewalls. We propose in this work a method to monitor and detect the presence of hidden channels that are based on an essential monitoring protocol "Internet Control Message Protocol" (ICMP). We undergo the network traffic with a set of verifications ranging from simple fields verification to more complex pattern matching operations. To validate our idea, we have installed Ptunnel, a tool that allows to tunnel TCP connections to a remote host using ICMP echo request and reply packets. Our experimental results show the possibility to discover such malicious traffic with high performance.
引用
收藏
页码:1247 / 1252
页数:6
相关论文
共 50 条
  • [1] Covert Distributed Detection over Discrete Memoryless Channels
    Bounhar, Abdelaziz
    Sarkiss, Mireille
    Wigger, Michele
    2024 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, ISIT 2024, 2024, : 172 - 177
  • [2] A Classifier Method for Detection of Covert Channels over LTE
    Wang, Zukui
    Huang, Liusheng
    Yang, Wei
    He, Zhiqiang
    2017 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY (CYBERC), 2017, : 454 - 460
  • [3] ICMP Covert Channel Resiliency
    Stokes, Kristian
    Yuan, Bo
    Johnson, Daryl
    Lutz, Peter
    TECHNOLOGICAL DEVELOPMENTS IN NETWORKING, EDUCATION AND AUTOMATION, 2010, : 503 - 506
  • [4] Protocol-independent Detection of "Messaging Ordering" Network Covert Channels
    Wendzel, Steffen
    14TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2019), 2019,
  • [5] Support vector machine based ICMP covert channel attack detection
    Sohn, T
    Noh, T
    Moon, J
    COMPUTER NETWORK SECURITY, 2003, 2776 : 461 - 464
  • [6] Detecting Protocol Switching Covert Channels
    Wendzel, Steffen
    Zander, Sebastian
    37TH ANNUAL IEEE CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN 2012), 2012, : 280 - 283
  • [7] Covert channel detection in the ICMP payload using support vector machine
    Sohn, T
    Moon, J
    Lee, S
    Lee, D
    Lim, J
    COMPUTER AND INFORMATION SCIENCES - ISCIS 2003, 2003, 2869 : 828 - 835
  • [8] Steganalysis of compressed speech to detect covert voice over Internet protocol channels
    Huang, Y.
    Tang, S.
    Bao, C.
    Yip, Y. J.
    IET INFORMATION SECURITY, 2011, 5 (01) : 26 - 32
  • [9] An Entropy-based Method for Detection of Covert Channels over LTE
    Wang, Zukui
    Huang, Liusheng
    Yang, Wei
    He, Zhiqiang
    PROCEEDINGS OF THE 2018 IEEE 22ND INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN ((CSCWD)), 2018, : 872 - 877
  • [10] ARP Spoofing Detection Algorithm Using ICMP Protocol
    Gao Jinhua
    Xia Kejian
    2013 INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND INFORMATICS, 2013,