The increasing diffusion of malware endowed with steganographic techniques requires to carefully identify and evaluate a new set of threats. The creation of a covert channel to hide a communication within network traffic is one of the most relevant, as it can be used to exfiltrate information or orchestrate attacks. Even if network steganography is becoming a well-studied topic, only few works focus on IPv6 and consider real network scenarios. Therefore, this paper investigates IPv6 covert channels deployed in the wild. Also, it presents a performance evaluation of six different data hiding techniques for IPv6 including their ability to bypass some intrusion detection systems. Lastly, ideas to detect IPv6 covert channels are presented.

IPv6 Covert Channels in the Wild

L Caviglione
2019

Abstract

The increasing diffusion of malware endowed with steganographic techniques requires to carefully identify and evaluate a new set of threats. The creation of a covert channel to hide a communication within network traffic is one of the most relevant, as it can be used to exfiltrate information or orchestrate attacks. Even if network steganography is becoming a well-studied topic, only few works focus on IPv6 and consider real network scenarios. Therefore, this paper investigates IPv6 covert channels deployed in the wild. Also, it presents a performance evaluation of six different data hiding techniques for IPv6 including their ability to bypass some intrusion detection systems. Lastly, ideas to detect IPv6 covert channels are presented.
2019
Istituto di Matematica Applicata e Tecnologie Informatiche - IMATI -
Inglese
Simon Vrhovec
CECC 2019: Proceedings of the Third Central European Cybersecurity Conference
CECC 2019: Central European Cybersecurity Conference
978-1-4503-7296-1
https://dl.acm.org/doi/pdf/10.1145/3360664.3360674
ACM - Association for Computing Machinery
New York
STATI UNITI D'AMERICA
Sì, ma tipo non specificato
14-15/11/2019
Munich, Germany
information hiding
covert channels
security
cybersecurity
3
open
Mazurczyk, W; Powójski, K; Caviglione, L
273
info:eu-repo/semantics/conferenceObject
04 Contributo in convegno::04.01 Contributo in Atti di convegno
File in questo prodotto:
File Dimensione Formato  
prod_406841-doc_146224.pdf

accesso aperto

Descrizione: CECC 2019: Proceedings of the Third Central European Cybersecurity Conference
Tipologia: Versione Editoriale (PDF)
Dimensione 149.48 kB
Formato Adobe PDF
149.48 kB Adobe PDF Visualizza/Apri

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/20.500.14243/361801
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus ND
  • ???jsp.display-item.citation.isi??? ND
social impact