Mobile Agents for Detecting Network Attacks Using Timing Covert Channels

被引:0
|
作者
Bieniasz, Jedrzej [1 ]
Stepkowska, Monika [1 ]
Janicki, Artur [1 ]
Szczypiorski, Krzysztof [1 ]
机构
[1] Warsaw Univ Technol, Div Cybersecur, Inst Telecommun, Warsaw, Poland
关键词
network security; traffic analysis; anomaly detection; intrusion detection; steganography; multi-agent systems; SYSTEMS;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
This article addresses the problem of network attacks using steganographic techniques based on the manipulation of time relationships between IP packets. In the study, an efficient method to detect such attacks is presented. The proposed algorithm is based on the Change Observation Theory, and employs two types of agents: base and flying ones. The agents observe the time parameters of the network traffic, using proposed meta-histograms and trained machine learning algorithms, in the node where they were installed. The results of experiments using various machine learning algorithm are presented and discussed. The study showed that the Random Forest and MLP classifiers achieved the best detection results, yielding an area under the ROC curve (AUC) above 0.85 for the evaluation data. We showed a proof-of-concept for an attack detection method that combined the classification algorithm, the proposed anomaly metrics and the mobile agents. We claim that due to a unique feature of self-regulation, realized by destroying unnecessary agents, the proposed method can establish a new type of multi-agent intrusion detection system that can be applied to a wider group of IT systems.
引用
收藏
页码:1109 / 1130
页数:22
相关论文
共 50 条
  • [1] Are Network Covert Timing Channels Statistical Anomalies?
    Iglesias, Felix
    Zseby, Tanja
    PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2017), 2017,
  • [2] COVERT TIMING CHANNELS FOR IOT OVER MOBILE NETWORKS
    Tan, Yu-an
    Zhang, Xiaosong
    Sharif, Kashif
    Liang, Chen
    Zhang, Quanxin
    Li, Yuanzhang
    IEEE WIRELESS COMMUNICATIONS, 2018, 25 (06) : 38 - 44
  • [3] Covert Channels in the HTTP Network Protocol: Channel Characterization and Detecting Man-in-the-Middle Attacks
    Brown, Erik
    Yuan, Bo
    Johnson, Daryl
    Lutz, Peter
    PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2010, : 56 - 64
  • [4] On the performance of using Covert Timing Channels for node authentication
    Newman, Reed
    Beyah, Raheem A.
    SECURITY AND COMMUNICATION NETWORKS, 2009, 2 (06) : 492 - 506
  • [5] An Entropy-Based Approach to Detecting Covert Timing Channels
    Gianvecchio, Steven
    Wang, Haining
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2011, 8 (06) : 785 - 797
  • [6] Evaluating the transmission rate of covert timing channels in a network
    Zi, Xiaochao
    Yao, Lihong
    Jiang, Xinghao
    Pan, Li
    Li, Jianhua
    COMPUTER NETWORKS, 2011, 55 (12) : 2760 - 2771
  • [7] Generic and Sensitive Anomaly Detection of Network Covert Timing Channels
    Li, Haozhi
    Song, Tian
    Yang, Yating
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (05) : 4085 - 4100
  • [8] Characterizing the Efficacy of the NRL Network Pump in Mitigating Covert Timing Channels
    Gorantla, Siva K.
    Kadloor, Sachin
    Kiyavash, Negar
    Coleman, Todd P.
    Moskowitz, Ira S.
    Kang, Myong H.
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2012, 7 (01) : 64 - 75
  • [9] Covert Channels in Network Time Security
    Lamshoeft, Kevin
    Dittmann, Jana
    PROCEEDINGS OF THE 2022 ACM WORKSHOP ON INFORMATION HIDING AND MULTIMEDIA SECURITY, IH-MMSEC 2022, 2022, : 69 - 79
  • [10] Detecting Protocol Switching Covert Channels
    Wendzel, Steffen
    Zander, Sebastian
    37TH ANNUAL IEEE CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN 2012), 2012, : 280 - 283