• DocumentCode
    3672884
  • Title

    Countermeasures for Covert Channel-Internal Control Protocols

  • Author

    Jaspreet Kaur;Steffen Wendzel;Michael Meier

  • Author_Institution
    Cyber Security Dept., Fraunhofer Inst. for Commun., Inf. Process. &
  • fYear
    2015
  • Firstpage
    422
  • Lastpage
    428
  • Abstract
    Network covert channels have become a sophisticated means for transferring hidden information over the network, and thereby breaking the security policy of a system. Covert channel-internal control protocols, called micro protocols, have been introduced in the recent years to enhance capabilities of network covert channels. Micro protocols are usually placed within the hidden bits of a covert channel´s payload and enable features such as reliable data transfer, session management, and dynamic routing for network covert channels. These features provide adaptive and stealthy communication channels for malware, especially bot nets. Although many techniques are available to counter network covert channels, these techniques are insufficient for countering micro protocols. In this paper, we present the first work to categorize and implement possible countermeasures for micro protocols that can ultimately break sophisticated covert channel communication. The key aspect of proposing these countermeasures is based on the interaction with the micro protocol. We implemented the countermeasures for two micro protocol-based tools: Ping Tunnel and Smart Covert Channel Tool. The results show that our techniques are able to counter micro protocols in an effective manner compared to current mechanisms, which do not target micro protocol-specific behavior.
  • Keywords
    "Protocols","Payloads","Routing","Overlay networks","Communication channels","Reliability","Timing"
  • Publisher
    ieee
  • Conference_Titel
    Availability, Reliability and Security (ARES), 2015 10th International Conference on
  • Type

    conf

  • DOI
    10.1109/ARES.2015.88
  • Filename
    7299946