Visible to the public A Protocol Independent Approach in Network Covert Channel Detection

TitleA Protocol Independent Approach in Network Covert Channel Detection
Publication TypeConference Paper
Year of Publication2019
AuthorsAyub, Md. Ahsan, Smith, Steven, Siraj, Ambareen
Conference Name2019 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC)
Date PublishedAug. 2019
PublisherIEEE
ISBN Number978-1-7281-1664-8
Keywordscomposability, compositionality, covert channel communication, covert channels, Decision Tree, DNS, DNS protocols, feature extraction, generic detection model, IP networks, IP protocols, IPv4, k-nearest neighbors, Kernel, logistic regression, Logistics, machine learning, network covert channel, network storage covert channel detection, network traffic dataset, protocol independent approach, protocol-independent approach, Protocols, pubcrawl, resilience, Resiliency, Scalability, stealth tunnels, supervised learning, supervised machine learning technique, support vector machine (SVM), Support vector machines, TCP, TCP protocols, telecommunication computing, telecommunication traffic, wireless channels
Abstract

Network covert channels are used in various cyberattacks, including disclosure of sensitive information and enabling stealth tunnels for botnet commands. With time and technology, covert channels are becoming more prevalent, complex, and difficult to detect. The current methods for detection are protocol and pattern specific. This requires the investment of significant time and resources into application of various techniques to catch the different types of covert channels. This paper reviews several patterns of network storage covert channels, describes generation of network traffic dataset with covert channels, and proposes a generic, protocol-independent approach for the detection of network storage covert channels using a supervised machine learning technique. The implementation of the proposed generic detection model can lead to a reduction of necessary techniques to prevent covert channel communication in network traffic. The datasets we have generated for experimentation represent storage covert channels in the IP, TCP, and DNS protocols and are available upon request for future research in this area.

URLhttps://ieeexplore.ieee.org/document/8919567
DOI10.1109/CSE/EUC.2019.00040
Citation Keyayub_protocol_2019