Modern malware now takes advantage of information hiding to avoid detection and implement various offensive and elusive mechanisms. The creation of covert channels, i.e., parasitic communication paths nested within legitimate traffic, is becoming a prime tool to exfiltrate sensitive information or retrieve additional malicious payloads. Despite their impact on the security of the Internet, a precise evaluation of the susceptibility of network traffic to covert channels is missing. Moreover, since the hiding capacity is driven by the targeted protocol and its diffusion, understanding their evolution is vital to engineering countermeasures. To fill such a research gap, this paper discusses how the susceptibility to information hiding mechanisms of major Internet protocols evolved from 1999 to 2021. Results suggest that a periodic quantification of the phenomena should be part of the continuous cyber security monitoring.

A Long-term Perspective of the Internet Susceptibility to Covert Channels

L Caviglione;
2023

Abstract

Modern malware now takes advantage of information hiding to avoid detection and implement various offensive and elusive mechanisms. The creation of covert channels, i.e., parasitic communication paths nested within legitimate traffic, is becoming a prime tool to exfiltrate sensitive information or retrieve additional malicious payloads. Despite their impact on the security of the Internet, a precise evaluation of the susceptibility of network traffic to covert channels is missing. Moreover, since the hiding capacity is driven by the targeted protocol and its diffusion, understanding their evolution is vital to engineering countermeasures. To fill such a research gap, this paper discusses how the susceptibility to information hiding mechanisms of major Internet protocols evolved from 1999 to 2021. Results suggest that a periodic quantification of the phenomena should be part of the continuous cyber security monitoring.
2023
Istituto di Matematica Applicata e Tecnologie Informatiche - IMATI -
covert channels
information hiding
cybersecurity
security
traffic analysis
internet evolution
File in questo prodotto:
Non ci sono file associati a questo prodotto.

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/20.500.14243/460868
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus ND
  • ???jsp.display-item.citation.isi??? ND
social impact