Covert channels nested within network traffic are becoming important tools for allowing malware to act unnoticed or to stealthily exchange and exfiltrate information. Thus, understanding how to detect or mitigate their utilization is of paramount importance, especially to counteract the rise of increasingly sophisticated threats. In this perspective, the literature proposed different approaches, including distributed wardens, which can be used to collect traffic in different portions of the network and compare the samples to check for discrepancies revealing the hidden communications. However, the use of some form of reversibility, i.e., being able to restore the exploited network carrier to its original form before the injection, can represent a hazard to such a detection scheme. Therefore, in this work we introduce and evaluate the performances of different techniques used to endow network covert channels with reversibility. Results indicate that providing reversibility in an efficient manner is possible but the used protocol plays a major role.

Design and Performance Evaluation of Reversible Network Covert Channels

Luca Caviglione
2020

Abstract

Covert channels nested within network traffic are becoming important tools for allowing malware to act unnoticed or to stealthily exchange and exfiltrate information. Thus, understanding how to detect or mitigate their utilization is of paramount importance, especially to counteract the rise of increasingly sophisticated threats. In this perspective, the literature proposed different approaches, including distributed wardens, which can be used to collect traffic in different portions of the network and compare the samples to check for discrepancies revealing the hidden communications. However, the use of some form of reversibility, i.e., being able to restore the exploited network carrier to its original form before the injection, can represent a hazard to such a detection scheme. Therefore, in this work we introduce and evaluate the performances of different techniques used to endow network covert channels with reversibility. Results indicate that providing reversibility in an efficient manner is possible but the used protocol plays a major role.
2020
Istituto di Matematica Applicata e Tecnologie Informatiche - IMATI -
978-1-4503-8833-7
information hiding
steganography
security
network covert channels
reversible steganography
File in questo prodotto:
File Dimensione Formato  
prod_424309-doc_154282.pdf

solo utenti autorizzati

Descrizione: Design and Performance Evaluation of Reversible Network Covert Channels
Tipologia: Versione Editoriale (PDF)
Dimensione 577.56 kB
Formato Adobe PDF
577.56 kB Adobe PDF   Visualizza/Apri   Richiedi una copia

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/20.500.14243/409527
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus ND
  • ???jsp.display-item.citation.isi??? ND
social impact