DOC PREVIEW
UMBC CMSC 691 - Embedding Covert Channels into TCP/IP

This preview shows page 1-2-3-19-20-38-39-40 out of 40 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 40 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 40 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 40 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 40 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 40 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 40 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 40 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 40 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 40 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

Embedding Covert Channels into TCP/IPOverviewNew and SignificantCovert ChannelsTypes of Covert ChannelsWhere is this relevant?Network Covert ChannelsTaxonomy (I)Taxonomy (II)Packet Header HidingIP HeaderTCP HeaderStorage BasedTiming Channels (I)Timing Channels (II)Frequency Based (I)Frequency Based (II)Protocol BasedTraditional Detection MechanismsThreat ModelIP Covert ChannelIP ID and TCP ISN ImplementationDetection of TCP/IP SteganographyIP ID CharacteristicsTCP ISN CharacteristicsExplicit Steganography DetectionSlide 27Slide 28ResultsDetection-Resistant TCP Steganography SchemesConclusionFuture WorkReferencesThanks a lot …Any QuestionsHomeworkCovert Channel ToolsLinux 2.0 ISN GeneratorLinux ISN and ID generatorOpen BSD ISN generatorCMSC 691I Clandestine ChannelsEmbedding Covert Channels into TCP/IPS.J. Murdoch, S. Lewis University of Cambridge, United Kingdom 7th Information Hiding Workshop, June 2005Sweety ChauhanOctober 26, 2005CMSC 691I 2Clandestine ChannelsOverviewNew and SignificantOverview of Covert ChannelsTCP/IP based SteganographyDetection of TCP/IP SteganographyConclusionCMSC 691I 3Clandestine ChannelsNew and SignificantProposed a scheme “Lathra” for encoding data in TCP/IP header not detected by wardenA message can be hidden so that an attacker cannot demonstrate its existence without knowing a secret keyCMSC 691I 4Clandestine ChannelsCovert ChannelsCommunication in a non-obvious mannerPotential methods - to get information out of the security perimeterTwo Types:StorageTimingCMSC 691I 5Clandestine ChannelsTypes of Covert ChannelsStorage TimingInformation conveyed by writing or abstaining from writingInformation conveyed by the timing of eventsClock not needed Receiver needs clockCMSC 691I 6Clandestine ChannelsWhere is this relevant?The use of covert channels is relevant in organizations that:restrict the use of encryption in their systemshave privileged or private informationwish to restrict communicationmonitor communicationsCMSC 691I 7Clandestine ChannelsNetwork Covert ChannelsInformation hidingplaced in network headers AND/ORconveyed through action/reactionGoal - channel undetectable or unobservableNetwork watchers (sniffer, IDS, ..) will not be aware that data is being transmittedCMSC 691I 8Clandestine ChannelsTaxonomy (I)Network covert channels can beStorage-basedTiming-basedFrequency-basedProtocol-basedany combination of the aboveCMSC 691I 9Clandestine ChannelsTaxonomy (II)Each of the above categories constitute a dimension of dataInformation hiding in packet payload is outside the realm of network covert channelsThese cases fit into the broader field of steganographyCMSC 691I 10Clandestine ChannelsPacket Header HidingIP Header TCP Header DATA 20-64 bytes 20-64 bytes 0-65,488 bytesIP Source AddressIP Destination AddressTCP Source PortTCP Destination PortThis is Information Assurance ClassTCP/IP Header can serve as a carrier for a steganographic covert channelCMSC 691I 11Clandestine ChannelsIP Header0-44bytesFields that may be used to embed steganographic dataCMSC 691I 12Clandestine ChannelsTCP Header0-44bytesTimestampCMSC 691I 13Clandestine ChannelsStorage BasedInformation is leaked by hiding data in packet header fields IP identification Offset Options TCP Checksum TCP Sequence NumbersCMSC 691I 14Clandestine ChannelsTiming Channels (I)Information is leaked by triggering or delaying events at specific time intervalsCMSC 691I 15Clandestine ChannelsTiming Channels (II)CMSC 691I 16Clandestine ChannelsFrequency Based (I)Information is encoded over many channels of cover trafficThe order or combination of cover channel access encodes informationCMSC 691I 17Clandestine ChannelsFrequency Based (II)CMSC 691I 18Clandestine ChannelsProtocol BasedExploits ambiguities or non-uniform features in common protocol specificationsCMSC 691I 19Clandestine ChannelsTraditional Detection MechanismsStatistical methodsStorage-basedData analysisTime-basedTime analysisFrequency-basedFlow analysisCMSC 691I 20Clandestine ChannelsThreat ModelPassive Warden Threat ModelActive Warden Threat ModelCMSC 691I 21Clandestine ChannelsIP Covert ChannelIP allows fragmentation and reassembly of long datagrams, requiring certain extra headersFor IP Networks:Data hidden in the IP headerData hidden in ICMP Echo Request and Response PacketsData tunneled through an SSH connection“Port 80” Tunneling, (or DNS port 53 tunneling)In image filesCMSC 691I 22Clandestine ChannelsIP ID and TCP ISN ImplementationTwo fields which are commonly used to embed steganographic data are the IP ID and TCP ISNDue to their construction, these fields contain some structurePartially unpredictableCMSC 691I 23Clandestine ChannelsDetection of TCP/IP SteganographyEach operating system exhibits well defined characteristics in generated TCP/IP fieldscan be used to identify any anomalies that may indicate the use of steganographysuite of testsapplied to network traces to identify whether the results are consistent with known operating systemsCMSC 691I 24Clandestine ChannelsIP ID Characteristics1. Sequential Global IP ID2. Sequential Per-host IP ID3. IP-ID MSB Toggle4. IP-ID PermutationCMSC 691I 25Clandestine ChannelsTCP ISN Characteristics5. Rekey Timer6. Rekey Counter7. ISN MSB Toggle8. ISN Permutation9. Zero bit 1510. Full TCP Collisions11. Partial TCP CollisionsCMSC 691I 26Clandestine ChannelsExplicit Steganography Detection12. Nushu Cryptographyencrypts data before including it in the ISN fieldresults in a distribution which is different from normally generated by Linux and so will be detected by the other TCP testsCMSC 691I 27Clandestine Channels13. TCP TimestampIf a low bandwidth TCP connection is being used to leak informationa randomness test can be applied to the least significant bits of the timestamps in the TCP packetsIf “too much“ randomness is detected in the LSBs → a steganographic covert channel is in useCMSC 691I 28Clandestine Channels14. Other Anomaliesunusual flags (e.g. DF when not expected, ToS set)excessive fragmentationuse of IP optionsnon-zero paddingunexpected TCP options (e.g. timestamps from operating systems which do not generate them)excessive re-orderingCMSC 691I 29Clandestine ChannelsResultsCMSC 691I


View Full Document

UMBC CMSC 691 - Embedding Covert Channels into TCP/IP

Documents in this Course
NOTES

NOTES

8 pages

OWL

OWL

109 pages

Security

Security

53 pages

SIP

SIP

45 pages

Proposals

Proposals

30 pages

Proposals

Proposals

30 pages

Load more
Download Embedding Covert Channels into TCP/IP
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Embedding Covert Channels into TCP/IP and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Embedding Covert Channels into TCP/IP 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?