Raising flags: Detecting covert storage channels using relative entropy | IEEE Conference Publication | IEEE Xplore

Raising flags: Detecting covert storage channels using relative entropy


Abstract:

This paper focuses on one type of Covert Storage Channel (CSC) that uses the 6-bit TCP flag header in TCP/IP network packets to transmit secret messages between accomplic...Show More

Abstract:

This paper focuses on one type of Covert Storage Channel (CSC) that uses the 6-bit TCP flag header in TCP/IP network packets to transmit secret messages between accomplices. We use relative entropy to characterize the irregularity of network flows in comparison to normal traffic. A normal profile is created by the frequency distribution of TCP flags in regular traffic packets. In detection, the TCP flag frequency distribution of network traffic is computed for each unique IP pair. In order to evaluate the accuracy and efficiency of the proposed method, this study uses real regular traffic data sets as well as CSC messages using coding schemes under assumptions of both clear text, composed by a list of keywords common in Unix systems, and encrypted text. Moreover, smart accomplices may use only those TCP flags that are ever appearing in normal traffic. Then, in detection, the relative entropy can reveal the dissimilarity of a different frequency distribution from this normal profile. We have also used different data processing methods in detection: one method summarizes all the packets for a pair of IP addresses into one flow and the other uses a sliding moving window over such a flow to generate multiple frames of packets. The experimentation results, displayed by Receiver Operating Characteristic (ROC) curves, have shown that the method is promising to differentiate normal and CSC traffic packet streams. Furthermore the delay of raising an alert is analyzed for CSC messages to show its efficiency.
Date of Conference: 22-24 July 2017
Date Added to IEEE Xplore: 10 August 2017
ISBN Information:
Conference Location: Beijing, China
Citations are not available for this document.

I. Introduction

Over the past few decades, concern about information security has increased dramatically as private and federal businesses discover more frequent traces of data breaches and unauthorized information acquisition. Advances in hacking have made these breaches easier to hide and harder to detect. Attackers can transmit messages containing valuable information undetected through an interconnected network like Internet, using covert communication channels.

Cites in Papers - |

Cites in Papers - Other Publishers (2)

1.
Aleksandra Mileva, Aleksandar Velinov, Vesna Dimitrova, Luca Caviglione, Steffen Wendzel, "Information Hiding in the DICOM Message Service and Upper Layer Service with Entropy-Based Detection", Entropy, vol.24, no.2, pp.176, 2022.
2.
Jingsong Cui, Chi Guo, Manli Zhang, Qi Guo, "A Method for Realizing Covert Communication at Router Driving Layer", Trusted Computing and Information Security, vol.1149, pp.104, 2020.

Contact IEEE to Subscribe

References

References is not available for this document.