Detection of Covert Channels over ICMP Protocol

被引:5
|
作者
Sayadi, Sirine [1 ]
Abbes, Tarek [1 ]
Bouhoula, Adel [2 ]
机构
[1] Univ Sfax, Natl Sch Elect & Telecommun Sfax, Sfax, Tunisia
[2] Higher Sch Commun Tunis, Cite El Ghazala 2083, Tunisia
来源
2017 IEEE/ACS 14TH INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS (AICCSA) | 2017年
关键词
Network Security; Covert Channel; Storage Channel; Traffic analysis; ICMP protocol; ICMP Tunneling; Tunneling Detection;
D O I
10.1109/AICCSA.2017.60
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the growing complexity of networks and communications protocols that become increasingly enormous and extensive, we are confronted with the problem of covert channel that affects the confidentiality and integrity of data sent in the network. Covert channels also known as hidden channels can elude basic security systems such as Intrusion Detection Systems (IDS) and firewalls. We propose in this work a method to monitor and detect the presence of hidden channels that are based on an essential monitoring protocol "Internet Control Message Protocol" (ICMP). We undergo the network traffic with a set of verifications ranging from simple fields verification to more complex pattern matching operations. To validate our idea, we have installed Ptunnel, a tool that allows to tunnel TCP connections to a remote host using ICMP echo request and reply packets. Our experimental results show the possibility to discover such malicious traffic with high performance.
引用
收藏
页码:1247 / 1252
页数:6
相关论文
共 50 条
  • [21] A Systematic Analysis of Covert Channels in the Network Time Protocol
    Hielscher, Jonas
    Lamshoeft, Kevin
    Kraetzer, Christian
    Dittmann, Jana
    ARES 2021: 16TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, 2021,
  • [22] TCP Covert Timing Channels: Design and Detection
    Luo, Xiapu
    Chan, Edmond W. W.
    Chang, Rocky K. C.
    2008 IEEE INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS & NETWORKS WITH FTCS & DCC, 2008, : 420 - 429
  • [23] Run-time detection of covert channels
    Nagatou, Naoyuki
    Watanabe, Takuo
    FIRST INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, PROCEEDINGS, 2006, : 577 - +
  • [24] Covert Channels Implementation and Detection in Virtual Environments
    Mihai, Irina
    Leordeanu, Catalin
    Patrascu, Alecsandru
    NETWORK AND SYSTEM SECURITY, 2017, 10394 : 575 - 584
  • [25] Towards a Reliable Detection of Covert Timing Channels over Real-Time Network Traffic
    Rezaei, Fahimeh
    Hempel, Michael
    Sharif, Hamid
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2017, 14 (03) : 249 - 264
  • [26] Enhance the Performance of ICMP Protocol by Reduction the IP Over Ethernet Naming Architecture
    Alzubaidi, Waleed Kh.
    Cai, Longzheng
    Alyawer, Shaymaa A.
    2014 INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCES (ICCOINS), 2014,
  • [27] Covert Communication over Classical-Quantum Channels
    Sheikholeslami, Azadeh
    Bash, Boulat A.
    Towsley, Don
    Goeckel, Dennis
    Guha, Saikat
    2016 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, 2016, : 2064 - 2068
  • [28] Analysis and Application of Covert Channels of Internet Control Message Protocol
    ZHOU Xueguang~ 1
    2. College of Electronic Engineering
    Wuhan University Journal of Natural Sciences, 2006, (06) : 1857 - 1861
  • [29] Analysis and Evaluation of Covert Channels over LTE Advanced
    Rezaei, Fahimeh
    Hempel, Michael
    Peng, Dongming
    Qian, Yi
    Sharif, Hamid
    2013 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2013, : 1903 - 1908
  • [30] Covert Communication Over Noisy Channels: A Resolvability Perspective
    Bloch, Matthieu R.
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2016, 62 (05) : 2334 - 2354