• DocumentCode
    110598
  • Title

    Engineering Statistical Behaviors for Attacking and Defending Covert Channels

  • Author

    Crespi, V. ; Cybenko, George ; Giani, Annarita

  • Author_Institution
    Dept. of Comput. Sci., CSULA, Los Angeles, CA, USA
  • Volume
    7
  • Issue
    1
  • fYear
    2013
  • fDate
    Feb. 2013
  • Firstpage
    124
  • Lastpage
    136
  • Abstract
    This paper develops techniques for attacking and defending behavioral anomaly detection methods commonly used in network traffic analysis and covert channels. The main new result is our demonstration of how to use a behavior´s or process´ k-order statistics to build a stochastic process that has the same k-order stationary statistics but possesses different, deliberately designed, (k+1) -order statistics if desired. Such a model realizes a “complexification” of the process or behavior which a defender can use to monitor whether an attacker is shaping the behavior. We also describe a source coding technique that respects the k -order statistics, including entropy which is a first order statistic for example, of a process while encoding information covertly, and we show how to achieve optimizing information rates. Although the main results and examples are stated in terms of behavioral anomaly detection for covert channels, the techniques are more generally applicable to behavioral anomaly analysis. One fundamental consequence of these results is that certain types of behavioral anomaly detection techniques come down to an arms race in the sense that the advantage goes to the party that has more computing resources applied to the problem.
  • Keywords
    channel coding; computer network security; higher order statistics; source coding; telecommunication traffic; behavior k-order statistics; behavioral anomaly detection method; covert channel attack; covert channel defending; encoding information; engineering statistical behaviors; entropy; first-order statistic; k-order stationary statistics; network traffic analysis; optimizing information rates; process complexification; process k-order statistics; source coding technique; stochastic process; Delay; Encoding; Entropy; Hidden Markov models; Probability; Stochastic processes; Behavioral anomaly detection; cognitive attack; covert channels; exfiltration; probabilistic automata; steganalysis;
  • fLanguage
    English
  • Journal_Title
    Selected Topics in Signal Processing, IEEE Journal of
  • Publisher
    ieee
  • ISSN
    1932-4553
  • Type

    jour

  • DOI
    10.1109/JSTSP.2012.2237378
  • Filename
    6400212