Detection of Covert Channels over ICMP Protocol

被引:7
作者
Sayadi, Sirine [1 ]
Abbes, Tarek [1 ]
Bouhoula, Adel [2 ]
机构
[1] Univ Sfax, Natl Sch Elect & Telecommun Sfax, Sfax, Tunisia
[2] Higher Sch Commun Tunis, Cite El Ghazala 2083, Tunisia
来源
2017 IEEE/ACS 14TH INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS (AICCSA) | 2017年
关键词
Network Security; Covert Channel; Storage Channel; Traffic analysis; ICMP protocol; ICMP Tunneling; Tunneling Detection;
D O I
10.1109/AICCSA.2017.60
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the growing complexity of networks and communications protocols that become increasingly enormous and extensive, we are confronted with the problem of covert channel that affects the confidentiality and integrity of data sent in the network. Covert channels also known as hidden channels can elude basic security systems such as Intrusion Detection Systems (IDS) and firewalls. We propose in this work a method to monitor and detect the presence of hidden channels that are based on an essential monitoring protocol "Internet Control Message Protocol" (ICMP). We undergo the network traffic with a set of verifications ranging from simple fields verification to more complex pattern matching operations. To validate our idea, we have installed Ptunnel, a tool that allows to tunnel TCP connections to a remote host using ICMP echo request and reply packets. Our experimental results show the possibility to discover such malicious traffic with high performance.
引用
收藏
页码:1247 / 1252
页数:6
相关论文
共 50 条
[31]   On the Capacity of Thermal Covert Channels in Multicores [J].
Bartolini, Davide B. ;
Miedl, Philipp ;
Thiele, Lothar .
PROCEEDINGS OF THE ELEVENTH EUROPEAN CONFERENCE ON COMPUTER SYSTEMS, (EUROSYS 2016), 2016,
[32]   Mobile Agents for Detecting Network Attacks Using Timing Covert Channels [J].
Bieniasz, Jedrzej ;
Stepkowska, Monika ;
Janicki, Artur ;
Szczypiorski, Krzysztof .
JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2019, 25 (09) :1109-1130
[33]   Capacity of Temperature-Based Covert Channels [J].
Zander, Sebastian ;
Branch, Philip ;
Armitage, Grenville .
IEEE COMMUNICATIONS LETTERS, 2011, 15 (01) :82-84
[34]   Leveraging Public Posts and Comments as Covert Channels [J].
Dearstyne, Steven ;
Johnson, Daryl .
21ST INTERNATIONAL CONFERENCE ON SYSTEMS, SIGNALS AND IMAGE PROCESSING (IWSSIP 2014), 2014, :179-182
[35]   Research on Covert Channels Based on Multiple Networks [J].
Zhang, Dongyan ;
Du, Pingxin ;
Yang, Zhiwen ;
Dong, Lan .
WEB TECHNOLOGIES AND APPLICATIONS, APWEB 2014, PT II, 2014, 8710 :365-375
[36]   A reliable and efficient micro-protocol for data transmission over an RTP-based covert channel [J].
Maryam Azadmanesh ;
Mojtaba Mahdavi ;
Behrouz Shahgholi Ghahfarokhi .
Multimedia Systems, 2020, 26 :173-190
[37]   Turning Federated Learning Systems Into Covert Channels [J].
Costa, Gabriele ;
Pinelli, Fabio ;
Soderi, Simone ;
Tolomei, Gabriele .
IEEE ACCESS, 2022, 10 :130642-130656
[38]   Are Network Covert Timing Channels Statistical Anomalies? [J].
Iglesias, Felix ;
Zseby, Tanja .
PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2017), 2017,
[39]   Victim-Aware Adaptive Covert Channels [J].
Bortolameotti, Riccardo ;
van Ede, Thijs ;
Continella, Andrea ;
Everts, Maarten ;
Jonker, Willem ;
Hartel, Pieter ;
Peter, Andreas .
SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM, PT I, 2019, 304 :450-471
[40]   Exploiting Deep Neural Networks as Covert Channels [J].
Pishbin, Hora Saadaat ;
Bidgoly, Amir Jalaly .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (04) :2115-2126