DocumentCode :
3672884
Title :
Countermeasures for Covert Channel-Internal Control Protocols
Author :
Jaspreet Kaur;Steffen Wendzel;Michael Meier
Author_Institution :
Cyber Security Dept., Fraunhofer Inst. for Commun., Inf. Process. &
fYear :
2015
Firstpage :
422
Lastpage :
428
Abstract :
Network covert channels have become a sophisticated means for transferring hidden information over the network, and thereby breaking the security policy of a system. Covert channel-internal control protocols, called micro protocols, have been introduced in the recent years to enhance capabilities of network covert channels. Micro protocols are usually placed within the hidden bits of a covert channel´s payload and enable features such as reliable data transfer, session management, and dynamic routing for network covert channels. These features provide adaptive and stealthy communication channels for malware, especially bot nets. Although many techniques are available to counter network covert channels, these techniques are insufficient for countering micro protocols. In this paper, we present the first work to categorize and implement possible countermeasures for micro protocols that can ultimately break sophisticated covert channel communication. The key aspect of proposing these countermeasures is based on the interaction with the micro protocol. We implemented the countermeasures for two micro protocol-based tools: Ping Tunnel and Smart Covert Channel Tool. The results show that our techniques are able to counter micro protocols in an effective manner compared to current mechanisms, which do not target micro protocol-specific behavior.
Keywords :
"Protocols","Payloads","Routing","Overlay networks","Communication channels","Reliability","Timing"
Publisher :
ieee
Conference_Titel :
Availability, Reliability and Security (ARES), 2015 10th International Conference on
Type :
conf
DOI :
10.1109/ARES.2015.88
Filename :
7299946
Link To Document :
بازگشت