Title :
Engineering Statistical Behaviors for Attacking and Defending Covert Channels
Author :
Crespi, V. ; Cybenko, George ; Giani, Annarita
Author_Institution :
Dept. of Comput. Sci., CSULA, Los Angeles, CA, USA
Abstract :
This paper develops techniques for attacking and defending behavioral anomaly detection methods commonly used in network traffic analysis and covert channels. The main new result is our demonstration of how to use a behavior´s or process´ k-order statistics to build a stochastic process that has the same k-order stationary statistics but possesses different, deliberately designed, (k+1) -order statistics if desired. Such a model realizes a “complexification” of the process or behavior which a defender can use to monitor whether an attacker is shaping the behavior. We also describe a source coding technique that respects the k -order statistics, including entropy which is a first order statistic for example, of a process while encoding information covertly, and we show how to achieve optimizing information rates. Although the main results and examples are stated in terms of behavioral anomaly detection for covert channels, the techniques are more generally applicable to behavioral anomaly analysis. One fundamental consequence of these results is that certain types of behavioral anomaly detection techniques come down to an arms race in the sense that the advantage goes to the party that has more computing resources applied to the problem.
Keywords :
channel coding; computer network security; higher order statistics; source coding; telecommunication traffic; behavior k-order statistics; behavioral anomaly detection method; covert channel attack; covert channel defending; encoding information; engineering statistical behaviors; entropy; first-order statistic; k-order stationary statistics; network traffic analysis; optimizing information rates; process complexification; process k-order statistics; source coding technique; stochastic process; Delay; Encoding; Entropy; Hidden Markov models; Probability; Stochastic processes; Behavioral anomaly detection; cognitive attack; covert channels; exfiltration; probabilistic automata; steganalysis;
Journal_Title :
Selected Topics in Signal Processing, IEEE Journal of
DOI :
10.1109/JSTSP.2012.2237378