7,190 Hits in 2.4 sec

Covert communications through network configuration messages

Ruben Rios, Jose A. Onieva, Javier Lopez
2013 Computers & security  
Covert channels are a form of hidden communication that may violate the integrity of systems.  ...  From this analysis we observe several features that can be effectively exploited for subliminal data transmission in the Dynamic Host Configuration Protocol (DHCP ).  ...  through the PISCIS (P10-TIC-06334) project.  ... 
doi:10.1016/j.cose.2013.03.004 fatcat:a5fsks3a35fd7pjo6icuyjwa6y

HIDE_DHCP: Covert Communications through Network Configuration Messages [chapter]

Ruben Rios, Jose A. Onieva, Javier Lopez
2012 IFIP Advances in Information and Communication Technology  
We analyze a protocol extensively used today, the Dynamic Host Configuration Protocol (DHCP ), in search of new forms of covert communication.  ...  Covert channels are a form of hidden communication that may violate the integrity of systems.  ...  This work has been partially funded by the European Commission through the FP7 project NESSoS (FP7 256890) and the Spanish Ministry of Science and Innovation through the research projects: ARES (CSD2007  ... 
doi:10.1007/978-3-642-30436-1_14 fatcat:qu7mtfnqeraalboqhke37feigm

Reporting Insider Threats via Covert Channels

David N. Muchene, Klevis Luli, Craig A. Shue
2013 2013 IEEE Security and Privacy Workshops  
In this work, we propose a covert channel in the Ethernet frame that allows a computer system to report activity inside other, unrelated network communication.  ...  Further, since the transmission is tied to the Ethernet frame, the communication cannot traverse network routers, preventing security information from leaving the organization.  ...  Message 3 is an altered version of Message 1 that includes a covert payload after the IP packet data. Message 4 is the transmission of the prior message from the kernel through the network interface.  ... 
doi:10.1109/spw.2013.30 dblp:conf/sp/MucheneLS13 fatcat:lu45lnqcd5gcjn6fuchuapndma

Using a novel blending method over multiple network connections for secure communication

Jaime C. Acosta, John D. Medrano
2011 2011 - MILCOM 2011 Military Communications Conference  
By analyzing the same traffic the covert receiver will identify the injection points and extract the covert messages.  ...  In the field of computer security, covert communication is usually seen as adversarial, but from another perspective, it can be seen as a way to communicate securely by hiding data from a malicious third  ...  CONCLUSIONS AND FUTURE WORK We have developed a novel method for secure communication that communicates through multiple concurrent covert channels and can scale as network congestion increases.  ... 
doi:10.1109/milcom.2011.6127512 dblp:conf/milcom/AcostaM11 fatcat:72erdu3pajgpdgjtma4imkhhdi

CCgen: Injecting Covert Channels into Network Traffic

Félix Iglesias, Fares Meghdouri, Robert Annessi, Tanja Zseby, Wenjuan Li
2022 Security and Communication Networks  
Here, we present CCgen, a framework for injecting covert channels into network traffic that includes modules for common covert channels at the network and transport layer and allows a smooth integration  ...  Covert channels are methods to convey information clandestinely by exploiting the inherent capabilities of common communication protocols.  ...  , Regions, and Tourism (BMLRT) under grant no. 873511. e authors acknowledge TU Wien Bibliothek for financial support through its Open Access Funding Programme.  ... 
doi:10.1155/2022/2254959 fatcat:ipbj5j2dybdvbeo7jutgiru43u

Realizing an 802.11-based covert timing channel using off-the-shelf wireless cards

Sakthi V. Radhakrishnan, A. Selcuk Uluagac, Raheem Beyah
2013 2013 IEEE Global Communications Conference (GLOBECOM)  
This same method of obfuscation can be used by legitimate users to transmit messages over hostile networks.  ...  By using covert channels, a malicious entity can hide messages within regular traffic and can thereby circumvent security mechanisms.  ...  to transmit messages over hostile networks.  ... 
doi:10.1109/glocom.2013.6831158 dblp:conf/globecom/RadhakrishnanUB13 fatcat:lzxb6c4yirbvpnpiemmifbmomq

Implementation of a Covert Channel in the 802.11 Header

Lilia Frikha, Zouheir Trabelsi, Wassim El-Hajj
2008 2008 International Wireless Communications and Mobile Computing Conference  
Depending on the configuration of the network, the covert channel uses either sequence control or initial vector fields, or both of them.  ...  Covert channels are an immense cause of security concern because they can be used to pass malicious messages. The messages could be in form of computer virus, spy programs, terrorist messages, etc.  ...  Related Works The first publication on network covert channels is a paper published in 1987 [2] . It points out three covert channels to show the possibility to create a channel through a LAN.  ... 
doi:10.1109/iwcmc.2008.103 fatcat:u54hq7gncneo3gwzasy5oamhpa

Behavioral Mimicry Covert Communication [chapter]

Seyed Ali Ahmadzadeh, Gordon Agnew
2012 Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering  
in the network, while it maintains a covert channel with the covert receiver through its behavioral fingerprints in the network.  ...  In such a configuration, the monitoring entity (i.e., the covert receiver) expects a specific covert message to be embedded in the channel access process of each legitimate node of the network.  ... 
doi:10.1007/978-3-642-31909-9_8 fatcat:uz5vx5lvzvh2vfqmcpnk2gnqza

On Covert Acoustical Mesh Networks in Air [article]

Michael Hanspach, Michael Goetz
2014 arXiv   pre-print
We further demonstrate how the scenario of covert acoustical communication over the air medium can be extended to multi-hop communications and even to wireless mesh networks.  ...  Covert channels can be used to circumvent system and network policies by establishing communications that have not been considered in the design of the computing system.  ...  software (based on the open JANUS waveform protocol) that we adapted for setting up a covert acoustical mesh network in air.  ... 
arXiv:1406.1213v1 fatcat:yngntnk6cbborbidrqinnho4de

On Covert Acoustical Mesh Networks in Air

Michael Hanspach, Michael Goetz
2013 Journal of Communications  
Index Terms-malware, network covert channels, wireless mesh networks, ultrasonic communication I.  ...  A covert acoustical mesh network can be conceived as a botnet or malnet that is accessible via near-field audio communications.  ...  software (based on the open JANUS waveform protocol) that we adapted for setting up a covert acoustical mesh network in air.  ... 
doi:10.12720/jcm.8.11.758-767 fatcat:bjj2tcrf6veohb2ihqzdzllwtu

A Research Paper on Steganography in IPV6

Lalit MohanJoshi, Amit Yadav, Sumit Sharma
2015 International Journal of Computer Applications  
A covert channel may refer to the actual medium that is used to communicate the information such as a message, image as well as file.  ...  This project uses steganography within the source address fields of Internet Protocol Version 6 (IPv6) packets to create a covert channel through which clandestine messages can be passed from one party  ...  Encoding Messages through Packet Creation (Active Injection): Another method used to send messages in the source-address covert channel of IPv6 is called Active Injection.  ... 
doi:10.5120/21767-5020 fatcat:5t3orvj72zb7lptbkbqjrff3my

A framework for avoiding steganography usage over HTTP

Jorge Blasco, Julio Cesar Hernandez-Castro, José María de Fuentes, Benjamín Ramos
2012 Journal of Network and Computer Applications  
In this paper, we consider the problem of using steganography through a widely used network protocol (i.e. HTTP).  ...  We analyze the steganographic possibilities of HTTP, and propose an active warden model to eliminate any covert communication channel. Our framework is meant to be useful in many scenarios.  ...  communication coming into a network.  ... 
doi:10.1016/j.jnca.2011.10.003 fatcat:ybhlvzs735b2djeshcqydegqka

Covert Timing Channel Analysis Either as Cyber Attacks or Confidential Applications

Shorouq Al-Eidi, Omar Darwish, Yuanzhu Chen
2020 Sensors  
In this paper, we study the inter-arrival time behavior of covert timing channels in two different network configurations based on statistical metrics, in addition we investigate the packet delaying threshold  ...  A key aspect in covert timing channels is to find the threshold of packet delay that can accurately distinguish covert traffic from legitimate traffic.  ...  The results showed that the highest number of bits that can be transmitted through the covert timing channel was recorded when short delays were used in both network configurations, as shown in Figure  ... 
doi:10.3390/s20082417 pmid:32344534 fatcat:37cbzispnfc25f7jfq6bof3hhy

An Integrated View of Security Analysis and Performance Evaluation: Trading QoS with Covert Channel Bandwidth [chapter]

Alessandro Aldini, Marco Bernardo
2004 Lecture Notes in Computer Science  
we propose an integrated and tool-supported methodology encompassing both activities, thus providing insights about how to trade the quality of service delivered by a system with the bandwidth of its covert  ...  For the sake of simplicity, since the amount of data sent from Low to High does not alter the kind of communications between Low and High through the NRL Pump, we considered a system configuration where  ...  During the connection, only THT directly communicates with High and only TLT directly communicates with Low. Moreover, TLT and THT directly interact only through the connection buffer.  ... 
doi:10.1007/978-3-540-30138-7_24 fatcat:adt4aka52rg6lik2jqejdorqh4

A Covert Channel Using Named Resources [article]

Joshua Davis, Victor S. Frost
2014 arXiv   pre-print
A network covert channel is created that uses resource names such as addresses to convey information, and that approximates typical user behavior in order to blend in with its environment.  ...  The channel correlates available resource names with a user defined code-space, and transmits its covert message by selectively accessing resources associated with the message codes.  ...  Covert channels are used when legitimate communication between the desired endpoint processes is forbidden, e.g. through security mechanisms.  ... 
arXiv:1408.4749v1 fatcat:pszs2735ijf3pg6jq66vvkczm4
« Previous Showing results 1 — 15 out of 7,190 results