SlideShare ist ein Scribd-Unternehmen logo
1 von 10
Downloaden Sie, um offline zu lesen
International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.6, November 2013

PERFORMANCE ANALYSIS OF TRANSPORT LAYER
BASED Hybrid Covert Channel Detection Engine
Anjan K1, Srinath N K1, Jibi Abraham2
1

Department Of Computer Science and Engineering,
R V College of Engineering,
Bangalore,India
2
College of Engineering, Pune, India

ABSTRACT
Computer network is unpredictable due to information warfareand is prone to various attacks. Such attacks
on network compromiseson the most important attribute, the privacy. Most of such attacksare devised using
special communication channel called Covert Channel".The word Covert" stands for hidden or nontransparent.Network Covert Channel is concealed communication paths within legitimatenetwork
communication that clearly violates security policies laiddown. Non-transparency in covert channel is also
referred to as trapdoor.A trapdoor is unintended design within legitimate communication whosemotto is
leak information. Subliminal channel, a variant of covert channelworks similarly as network covert channel
except that trapdoor is setin cryptographic algorithm. A composition of covert channel with
subliminalchannel is the Hybrid Covert Channel". Hybrid covert channelis the homogeneous or
heterogeneous mixture of two or more variantsof covert channel either active at same instance or at
different instanceof time. Detecting such malicious channel activity plays a vital role inremoving threat to
legitimate network.In this paper, we introduce new detection engine for hybrid covert channelin transport
layer visualized in TCP and SSL. A setup made onexperimental test bed (DE-HCC9) in RD Lab of our
department. Thepurpose of this study is to introduce few performance metrics to evaluatedetection engine
and also to understand the multi-trapdoor natureof covert channel.

KEYWORDS
Covert Channel, Subliminal Channel, Hybrid Covert Channel,Network Security, Trapdoors

1. INTRODUCTION
Recent tremendous growth in network has increased more awareness about security aspects
amongst spectrum of technical fraternity. It’s unfortunate that there are too few people working
on securing channel against threat of covert channel. Detection methods are still at its infancy and
depend on the structure of network under consideration.
Covert Channel[1,2,3] is a malicious conversation within a legitimate network communication.
Covert Channels clearly violate the security policies laid down by the network environment
allowing the information leak to the unauthorized or unknown receiver. Covert Channels do not
have concrete definition and are scenario oriented. Covertness in these channels exhibit behaviors
like multi-trapdoor and protocol hopped where in which channeling is not constrained to pair of
communication entities. A fundamental covert channel can be visualized in the figure.1 depicting
the covert communication model employed in the covert channel with pre-shared information
encoding and decoding scheme between the covert users.

DOI : 10.5121/ijnsa.2013.5605

55
International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.6, November 2013

Figure 1:Covert Channel Visualization

Covert channel can also exist between threads in process or processes in operating system or
amongst distributed entities. The focus here is on the design exploration in the specific network
protocol and in security protocol. Covert channel is associated with similar terminologies like
side channel or stegnographic channel or supraliminal channel, these literature terms are
indifferent to each other and stand on the motto of promoting covertness in different forms or
scenarios in a communication model over legitimate network.
Covert Channels in general exhibit some characteristics: Bandwidth and Covertness Index. The
bandwidth is the amount of covert data sent in the network as per the figure 1. This can be
formulated using the Shannon’s Channel Capacity –
ܶ
‫ܥ‬௖௢௩௘௥௧ ൌ ݈‫݃݋‬ଶ ൬1 ൅ ൰
ܰ
Where T is the flow of Covert data and N is the Noise in the channel during transmission. For the
network channel with covert communication the total bandwidth of the channel C always will be
‫ܥ‬௖௢௩௘௥௧ ൏ ‫ܥ‬
The Covertness index [16] is the strength of the detection of the trapdoor placed in the network
protocols which determines the appropriate detection methods to be employed. The covert
channels are broad classification is described in [5].
Hybrid Covert Channel(HCC) [5], a variant of covert channel is defined as homogeneous or
heterogeneous composition of two or more covert channel variants existing either at same
instance or at different instance of time. Hybrid Covert Channel may be composed of many covert
channels and does not have fixed composition. Due to this it is impossible to detect all the
possible channels in HCC at real time. HCC can also behave as single coherent channel with
characteristics as multi-trapdoor and protocol hopped [10]. Hybrid Covert Channel here as shown
in figure 2 is visualized as a combination of simple network covert channel in TCP and subliminal
channel in SSL, both being transport layer protocols.

56
International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.6, November 2013

Figure 2: Hybrid Covert Channel in Transport Layer

Further section of this paper covers various detection methods and system totackle the hybrid
covert channel based on the proper detection method. Section2 explores related work. Section 4
gives brief insight about various detectionmethodology and chosen detection method for hybrid
covert channel scenario.Section 5 delineates about the system design and implementation. Section
6gives testing of the system in DE-HCC9. Conclusion and future enhancementsis provided in
section 7.

2. RELATED WORK
Extensive work has been done to devise better detection methods to detect only covert channel
either on live wire or on a dataset. In [7] is based on detecting covert shells by monitoring the
unusual traffic in the network stream. Covert timing channels are design and detecting in [8]
based on packet inter-arrival and modelling whole process as Poisson's distribution. Illegal
information flows in covert channels are tracked by tracing the Message Sequence Charts (MSC)
in [9]. This paper employs a statistical protocol based detection [11] to detect hybrid covert
channel based on analysis made on packet headers.

3. DETECTION METHODS
Detection methods [11] are based on the anomaly or signature match in the protocols of the
network stack. However, there is new covert language encoding schemes in the protocols that
make sit sophisticated to detect it. The channel detection scheme must follow various rounds of
checks before the alert is flashed to the administrator of the network and must actively scan the
flow of information in the channel. If the same process is carried in after an attack event then the
procedure is purely under Network Forensics. If the detection schemes are capable identifying a
victimized resource then the process is termed as Covert Channel Identification. There are
different methods used to detect a covert channel and it presented below –

3.1. Signature Based Detection
Signature-based is also termed as misuse based detection and is carried out actively on the
network streams by searching specific patterns or signature of standard protocol. In such cases the
algorithm alarms the network of a breach. The popular tool which can detect is NetCat - which is
a reverse-shell communication between the internal network and a public network.

57
International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.6, November 2013

3.2. Protocol Based Detection
Protocol based detection scheme is simple profiling of each protocol used in communication.
This is refereed to a deep packet analysis where the each header is scanned to understand its
standard values. The standard profile of a protocol is the protocol specification described in their
RFC's. Covert_TCPtool manipulates sequence number field, ACK Field in TCP and IP ID in IPv4
packet for the covert communication.

3.3. Behavioral Based Detection
Behavioural based detection scheme is sophisticated scheme as it monitors user profiles, resource
profiles and reference profiles. It detects the unusual behaviour in the network and is performed in
real-time. The detection is based on deviation of usage of the network from normal scenarios. A
simple instance can be multiple packet transmission from a source with same sequence number
and keeping the traffic of the network it is peak.

3.4. Other Approaches
Other Approaches includes detection based on the supervised learning schemes like neural
network. Neural network approach involves training the network for `T' period until required
accurate values to trigger the alarm process by the detection engine. Scenario based Bayes
interference is to set up a system in which each suspicious matched signature (hypothetical attack)
found in the monitored data stream is part of a global set (symptoms) and use each global set to
calculate, with a Bayes inference, the probability for a known attack to be on hold knowing the
P(Hypothetical attack / Symptoms) probability.If the detection engine finds a suspicious scenario
which probability value is greater than a set threshold, an alarm process is triggered by the
detection engine.
Above categorization can also behave as either statistical or probabilistic. A statistical approach is
to run the detection engine for `t' hours and record an amount of data `D'. This period is called as
learning period and such approach helps to increase the accuracy and also to set the threshold
value for the alarm process. A probabilistic approach is to set a probability for the specific event S
that occurs after P, Q and R as Y%. This helps the detection engine to tune itself to such event in
its running period.

4. SYSTEM DESIGN AND IMPLEMENTATION
Major Design Criteria
HCC in transport layer is combination of trapdoors placed in TCP and backdoors placed in TLS.
The design of the channels with respect to TCP and TLS are different. It works on simple packet
capture utility and then analysis of payload and headers. TCP payload will content – TLS/SSL
content and process forming the content is specified in the figure 3.

58
International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.6, November 2013

Figure 3:Hybrid Covert Channel Formation

In figure 3, words marked with red refer to covert process and those with black refer to legitimate
process. Channel has to constructed to test the detection engines accuracy and its covertness
index. This would suggest the best suited detection schemes to be used for achieve positive
detections. The approach here can be combination of Protocol and Signature based schemes also
referred to as Statistical Protocol Based Detection.
Designing Hybrid Covert Channel takes two different routes discussed in the coming subsections. With reference to figure 3, flow of design follows first subliminal channel in SSL and
then the simple network covert channel in TCP.

4.1Designing Subliminal Channel in TLS/ SSL
SSL had wide range of cipher algorithm that assist in secured communication. One such
algorithm is the DSA that provide authentication service. Subliminal Channel is created in DSA
as per [13]. Practically this can done in following ways 1. Covert user generates a random number and provides it during the signature generation
process.
2. Covert user replaces system generated public-private keys with the keys that covert
process has generated. This may even content bit and bytes of the covert message to be
communicated.
3. The Signature component used in the TLS will content the subliminal message generated
in 2. This will be sued as communication medium for the reciver to understand the
message sent by the covert sender.
4. Programmatically this can be accomplished either with OpenSSL or JSSE secure sockets.

4.2Designing Simple Network Covert Channel in TCP
The process of the covert channel generation in network protocol as described in [5] where the
covert sender places his covert data in covert vulnerable fields like Sequence Number, Flags,
Ack, options and reserved. The focus here is on constructing simple network covert channel, with
59
International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.6, November 2013

specific focus on Sequence number, padding and Flags fields of the TCP. Direct access of the
network card is required to send this TCP packet by the covert user. This can accomplished in
following ways –
1. Jpcap libraries in Java that gives direct control of the interface to developer, here a covert
user.
2. BSD socket in Linux where socket creation can be done in the raw mode of operation to
create custom packet and informing the kernel not append checksum as this done the
developer.

4.3 Design and Implementation of Detection Engine
The design of the detection engine takes two stages- one for detecting the subliminal channel in
TLS/SSL and the other is for the simple network covert channel in TCP. In TCP based covert
channel, TCP packet must be available for diagnosis; this can be accomplished by employing a
protocol sniffer. In TLS/ SSL payload, it assumed that covert user has replaced the original
supplied keys and also random number is manipulated. In such cases randomness test for both
keys and the random number will prove that fact of trapdoor placed by covert party.
Detection Engine Algorithm:
Step 1: Capture TCP packets from Network Interface using protocol
sniffer fromuser specified network device
Step 2: Store the TCP packet in database by parsing each fields.
Step 3: Analyse the TCP header for the covert vulnerable fields.
Step 4: Analyse the signature component in the TLS which is a
payload in TCP payload and testifythe key against Randomness
tester
Step 5: Log the entries of the covert and subliminal activity.
Step
6:
Compute
the
performance
graph
and
contentcomputation from the each session data set.

detection

5. TESTING
Testing results are based on the design consideration made in [6]. DE-HCC9 test bed performance
will be based on its detection rate and detection content under different circumstances. The
variables to be considered for the performance analysis are listed as follows for `n' nodes in the
experimental test bed with `s' sample count and for the session `t'. Let
-

αbe the total number of packet captured.

-

β be the number of TCP packets captured

-

γ cardinality of dataset previously collected

-

T be the total number of detection made

-

tbe total number of available TCP packets in database.
60
International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.6, November 2013

-

Φ Relative Detection Content with respect to β.

-

η Absolute Detection Content with respect to α

Total number of TCP in database or dataset is
‫ݐ‬ൌ ߛ൅ ߚ

(1)

In the equation 1 if ߛ ൌ 0 and ‫ ݐ‬ൌ ߚ
The calculations for detection content are performed using the expressions.
ܶ
߶ൌ
ߚ
ߟൌ

ܶ
‫ݐ‬

The threshold value for γ is 10000 packets.

߶൅ߟ
2
Experiments made on DE-HCC9 indicate that packet capturing from thenetwork interface has
uniform increase with respect to time. This is visualizedin graph obtained from the test bed show
in figure 4.
‫ ߠ ݁ݐܽݎ ݊݋݅ݐܿ݁ݐ݁ܦ ݁݃ܽݎ݁ݒܣ‬ൌ

Figure 4: Total No. of Packets (α) Vs Time

61
International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.6, November 2013

Figure 5: TCP PacktsVs Time

This figure 5 completely depends on the traffic in the subnet and node count.The detection
content in TCP for 5 nodes varies between 15% - 30% and average detection rate at 70% - 97% as
depicts in the figure 6. Also that detection content depends on number of times covert channel is
invoked in that session. If sampling is done for infinity then these percentages decrease to small
number or even negligible, which is true in the real network scenario.

Figure 6: Average Detection Rate Vs No. of Runs

5. CONCLUSION AND FUTURE WORK
Hard Compromise on confidential information and is clearly unacceptable in presence of security
measures for legitimate network. Conspiracy between communication parties is not legitimate
(Covert Parties) and existence of Hybrid Covert Channel is the strongest threat in communication
which should be decommissioned. Conclusion is to build system to detect the activity of Hybrid
covert channel in a small scale LAN. This paper has focused such system and also introduces
performance metrics to evaluate such system in experimental test bed (DE-HCC9).

62
International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.6, November 2013

The project develop is primitive attempt to detect the hybrid covet channel and further
improvements include the adding following features
-

To cover most of the possible covert fields in TCP packet header like acknowledgment
bounce and options.
Include elimination protocol especially suited for the scenario considered in this project
called ``Spoofed Pump'' protocol.
Further to include possible hybrid combination of covert in the TCP/IP protocol stack.
Analyse the similar possibility of hybrid channelling in case of Ad hoc wireless network
since existing of covert channel in routing algorithm headers is possible.

ACKNOWLEDGEMENT
Anjan K would like to thank Late Dr. V.K Ananthashayana, Erstwhile Head, Department of
Computer Science and Engineering, M.S.Ramaiah Institute of Technology, Bangalore, for
igniting the passion for research.

REFERENCES
[1]

Vishal Bharti, Practical Development and Deployment of Covert Communication in IPv4, Journal on
Theoretical and Applied Information Technology, Apr 2007.

[2]

Sebastian Zander et.al.: Covert Channels and Counter Measures in Computer Network Protocols,
IEEE communication Magazine on survey an tutorials, December 2007.

[3]

SweetyChauhan, Analysis and Detection of Network Covert channel, Technical Report by
Department of computer science and Electrical Engineering,University of Maryland Baltimore
County, Dec 2005.

[4]

EnpingLi , Scott Craver, A supraliminal channel in a wireless phone application, Proceedings of the
11th ACM workshop on Multimedia and security, September 07-08, 2009, Princeton, New Jersey,
USA.

[5]

KoundinyaAnjan and Jibi Abraham, Behaviour Analysis of Transport Layer based Hybrid Covert
Channel, Third International Conference on Network Security and Application, Springer-Verlag
LNCS series, Chennai, India, Jul 2010.

[6]

Anjan K Koundinya and Jibi Abraham, Design of Transport Layer Based Hybrid Covert Channel
Detection Engine, International Journal of Ad hoc, Sensor and Ubiquitous Computing, Dec 2010.

[7]

SarderCabuk,CarlaBrodley,ClaySheilds, IP Covert Channel Detection, ACM Transaction on
Information and System Security, Vol 12, Article 22, Apr 2009.

[8]

SarderCabuk,CarlaBrodley,ClaySheilds, IP Covert Timing Channels : Design and Detection, CCS' 04,
Oct 2004.

[9]

Lo`icH'elouet., Claude Jard, Marc Zeitoun, Covert channels detection in protocols using scenarios,
SPV'03, April 2003.

[10] Steffen Wendzel, Protocol Channels, HAKIN9,Jun 2009.
[11] Description of Detection Approaches at url –http://gray-world.net/projects/papers/html/cctde.html
[12] Description of JPcap Libraries at url-http://netresearch.ics.uci.edu/kfujii/jpcap/doc/index.html
[13] Gustavus J Simmons, The Subliminal Channel and Digital Signatures, Springer-Verlag, 1998.
[14] Jerry Banks et.al. Discrete Event System Simulation, Third edition, Prentice Hall, Jan 2001
[15] Description of Randomness test suite - JRandTester at url-http://sourceforge.net/projects/jrandtest
63
International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.6, November 2013
[16] Anjan K, Gururaja H S et.al., Covertness Analysis of Subliminal Channelsin Legitimate
Communication, ADCONS 2011, LNCS 7135, pp. 582–591, 2012

AUTHOR’S PROFILE
Anjan K has received his B.E degree from Visveswariah Technological University,
Belgaum, India in 2007 And his master degree from from Department of Computer
Science and Engineering, M.S. Ramaiah Institute of Technology, Bangalore, India. He has
been awarded Best Performer PG 2010 for his academic excellence. His areas of research
includes Network Security and Cryptography, Adhoc Networks, Mobile Computing,
Agile Software Engineering. He is currently working as Assistant Professor in Dept. of
Computer Science and Engineering, R V College of Engineering.
Srinath N K has his M.E degree in Systems Engineering and Operations Research from
Roorkee University, in 1986 and PhD degree from AvinashLingum University, India in
2009. His areas of research interests include Operations Research, Parallel and Distributed
Computing, DBMS, Microprocessor. His is working as Professor and Head, Dept of
Computer Science and Engineering, R V College of Engineering.
Jibi Abraham has received her M.S degree in Software Systems from BITS, Rajasthan,
India in 1999 and PhD degree from VisveswariahTechnologicalUniversity, Belgaum, India
in 2008 in the area of Network Security. Her areas of research interests include Network
routing algorithms, Cryptography, Network Security of Wireless Sensor Networks and
Algorithms Design.She is working as Professor in Dept. of CEIT, College of Engineering
Pune.

64

Weitere ähnliche Inhalte

Was ist angesagt?

C241721
C241721C241721
C241721irjes
 
Wormhole attack mitigation in manet a
Wormhole attack mitigation in manet aWormhole attack mitigation in manet a
Wormhole attack mitigation in manet aIJCNCJournal
 
Prevention of Selective Jamming Attacks by Using Packet Hiding Methods
Prevention of Selective Jamming Attacks by Using Packet Hiding MethodsPrevention of Selective Jamming Attacks by Using Packet Hiding Methods
Prevention of Selective Jamming Attacks by Using Packet Hiding MethodsIOSR Journals
 
A precise termination condition of the probabilistic packet marking algorithm...
A precise termination condition of the probabilistic packet marking algorithm...A precise termination condition of the probabilistic packet marking algorithm...
A precise termination condition of the probabilistic packet marking algorithm...Mumbai Academisc
 
A Neighbor Coverage-Based Probabilistic Rebroadcast for Reducing Routing Ove...
A Neighbor Coverage-Based Probabilistic Rebroadcast for  Reducing Routing Ove...A Neighbor Coverage-Based Probabilistic Rebroadcast for  Reducing Routing Ove...
A Neighbor Coverage-Based Probabilistic Rebroadcast for Reducing Routing Ove...IJMER
 
Secure and Reliable Data Routing in Wireless Sensor Network
Secure and Reliable Data Routing in Wireless Sensor NetworkSecure and Reliable Data Routing in Wireless Sensor Network
Secure and Reliable Data Routing in Wireless Sensor Networkdbpublications
 
PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEW
PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEWPACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEW
PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEWIJNSA Journal
 
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS ijasuc
 
Enhanced Secure Routing Model for MANET
Enhanced Secure Routing Model for MANETEnhanced Secure Routing Model for MANET
Enhanced Secure Routing Model for MANETcscpconf
 
An enhanced ip traceback mechanism for tracking the attack source using packe...
An enhanced ip traceback mechanism for tracking the attack source using packe...An enhanced ip traceback mechanism for tracking the attack source using packe...
An enhanced ip traceback mechanism for tracking the attack source using packe...IAEME Publication
 
Prevention of Packet Hiding Methods In Selective Jamming Attack
Prevention of Packet Hiding Methods In Selective Jamming AttackPrevention of Packet Hiding Methods In Selective Jamming Attack
Prevention of Packet Hiding Methods In Selective Jamming AttackIJCERT
 
INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...
INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...
INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...ijp2p
 

Was ist angesagt? (15)

C241721
C241721C241721
C241721
 
Wormhole attack mitigation in manet a
Wormhole attack mitigation in manet aWormhole attack mitigation in manet a
Wormhole attack mitigation in manet a
 
I1802046780
I1802046780I1802046780
I1802046780
 
Prevention of Selective Jamming Attacks by Using Packet Hiding Methods
Prevention of Selective Jamming Attacks by Using Packet Hiding MethodsPrevention of Selective Jamming Attacks by Using Packet Hiding Methods
Prevention of Selective Jamming Attacks by Using Packet Hiding Methods
 
A precise termination condition of the probabilistic packet marking algorithm...
A precise termination condition of the probabilistic packet marking algorithm...A precise termination condition of the probabilistic packet marking algorithm...
A precise termination condition of the probabilistic packet marking algorithm...
 
A Neighbor Coverage-Based Probabilistic Rebroadcast for Reducing Routing Ove...
A Neighbor Coverage-Based Probabilistic Rebroadcast for  Reducing Routing Ove...A Neighbor Coverage-Based Probabilistic Rebroadcast for  Reducing Routing Ove...
A Neighbor Coverage-Based Probabilistic Rebroadcast for Reducing Routing Ove...
 
Secure and Reliable Data Routing in Wireless Sensor Network
Secure and Reliable Data Routing in Wireless Sensor NetworkSecure and Reliable Data Routing in Wireless Sensor Network
Secure and Reliable Data Routing in Wireless Sensor Network
 
PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEW
PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEWPACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEW
PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEW
 
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
 
Ijnsa050211
Ijnsa050211Ijnsa050211
Ijnsa050211
 
Enhanced Secure Routing Model for MANET
Enhanced Secure Routing Model for MANETEnhanced Secure Routing Model for MANET
Enhanced Secure Routing Model for MANET
 
B035410013
B035410013B035410013
B035410013
 
An enhanced ip traceback mechanism for tracking the attack source using packe...
An enhanced ip traceback mechanism for tracking the attack source using packe...An enhanced ip traceback mechanism for tracking the attack source using packe...
An enhanced ip traceback mechanism for tracking the attack source using packe...
 
Prevention of Packet Hiding Methods In Selective Jamming Attack
Prevention of Packet Hiding Methods In Selective Jamming AttackPrevention of Packet Hiding Methods In Selective Jamming Attack
Prevention of Packet Hiding Methods In Selective Jamming Attack
 
INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...
INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...
INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...
 

Andere mochten auch

Hr africa shane hodgson v0.3
Hr africa shane hodgson v0.3Hr africa shane hodgson v0.3
Hr africa shane hodgson v0.3Shane Hodgson
 
My three favorite subjects
My three favorite subjectsMy three favorite subjects
My three favorite subjectsatiero81
 
Mto summit hodgson presentation
Mto summit   hodgson presentationMto summit   hodgson presentation
Mto summit hodgson presentationShane Hodgson
 
Securing mobile cloud using finger print authentication
Securing mobile cloud using finger print authenticationSecuring mobile cloud using finger print authentication
Securing mobile cloud using finger print authenticationIJNSA Journal
 
Investigating the effects of the common control channel challenge in multicha...
Investigating the effects of the common control channel challenge in multicha...Investigating the effects of the common control channel challenge in multicha...
Investigating the effects of the common control channel challenge in multicha...IJNSA Journal
 
Menulis Review Film
Menulis Review FilmMenulis Review Film
Menulis Review FilmYulef Dian
 
Administració i gestió d'organitzacions - Pac1 - Solució - Lidia Bria
Administració i gestió d'organitzacions - Pac1 - Solució - Lidia BriaAdministració i gestió d'organitzacions - Pac1 - Solució - Lidia Bria
Administració i gestió d'organitzacions - Pac1 - Solució - Lidia BriaLidia Bria
 
Administració i gestió d'organitzacions - Pac2 - Lidia Bria
Administració i gestió d'organitzacions - Pac2 - Lidia BriaAdministració i gestió d'organitzacions - Pac2 - Lidia Bria
Administració i gestió d'organitzacions - Pac2 - Lidia BriaLidia Bria
 
Administració i gestió d'organitzacions - Pac4 - Lidia Bria
Administració i gestió d'organitzacions - Pac4 - Lidia BriaAdministració i gestió d'organitzacions - Pac4 - Lidia Bria
Administració i gestió d'organitzacions - Pac4 - Lidia BriaLidia Bria
 
Administració i gestió d'organitzacions - Pac3 - Solució - Lídia Bria
Administració i gestió d'organitzacions - Pac3 - Solució - Lídia BriaAdministració i gestió d'organitzacions - Pac3 - Solució - Lídia Bria
Administració i gestió d'organitzacions - Pac3 - Solució - Lídia BriaLidia Bria
 
A need for peer to-peer strong local authentication protocol (p2 pslap) in mo...
A need for peer to-peer strong local authentication protocol (p2 pslap) in mo...A need for peer to-peer strong local authentication protocol (p2 pslap) in mo...
A need for peer to-peer strong local authentication protocol (p2 pslap) in mo...IJNSA Journal
 
Multi carrier equalization by restoration of redundanc y (merry) for adaptive...
Multi carrier equalization by restoration of redundanc y (merry) for adaptive...Multi carrier equalization by restoration of redundanc y (merry) for adaptive...
Multi carrier equalization by restoration of redundanc y (merry) for adaptive...IJNSA Journal
 
Pause Photo Prose, un projet de jeu vidéo pour faire comprendre la photographie
Pause Photo Prose, un projet de jeu vidéo pour faire comprendre la photographiePause Photo Prose, un projet de jeu vidéo pour faire comprendre la photographie
Pause Photo Prose, un projet de jeu vidéo pour faire comprendre la photographieYannick Vernet
 

Andere mochten auch (17)

Hr africa shane hodgson v0.3
Hr africa shane hodgson v0.3Hr africa shane hodgson v0.3
Hr africa shane hodgson v0.3
 
Mileniumi (1)
Mileniumi (1)Mileniumi (1)
Mileniumi (1)
 
My three favorite subjects
My three favorite subjectsMy three favorite subjects
My three favorite subjects
 
Mto summit hodgson presentation
Mto summit   hodgson presentationMto summit   hodgson presentation
Mto summit hodgson presentation
 
Group project 2
Group project 2Group project 2
Group project 2
 
Securing mobile cloud using finger print authentication
Securing mobile cloud using finger print authenticationSecuring mobile cloud using finger print authentication
Securing mobile cloud using finger print authentication
 
Investigating the effects of the common control channel challenge in multicha...
Investigating the effects of the common control channel challenge in multicha...Investigating the effects of the common control channel challenge in multicha...
Investigating the effects of the common control channel challenge in multicha...
 
Instagram tutorial
Instagram tutorialInstagram tutorial
Instagram tutorial
 
Menulis Review Film
Menulis Review FilmMenulis Review Film
Menulis Review Film
 
Administració i gestió d'organitzacions - Pac1 - Solució - Lidia Bria
Administració i gestió d'organitzacions - Pac1 - Solució - Lidia BriaAdministració i gestió d'organitzacions - Pac1 - Solució - Lidia Bria
Administració i gestió d'organitzacions - Pac1 - Solució - Lidia Bria
 
Administració i gestió d'organitzacions - Pac2 - Lidia Bria
Administració i gestió d'organitzacions - Pac2 - Lidia BriaAdministració i gestió d'organitzacions - Pac2 - Lidia Bria
Administració i gestió d'organitzacions - Pac2 - Lidia Bria
 
Administració i gestió d'organitzacions - Pac4 - Lidia Bria
Administració i gestió d'organitzacions - Pac4 - Lidia BriaAdministració i gestió d'organitzacions - Pac4 - Lidia Bria
Administració i gestió d'organitzacions - Pac4 - Lidia Bria
 
Administració i gestió d'organitzacions - Pac3 - Solució - Lídia Bria
Administració i gestió d'organitzacions - Pac3 - Solució - Lídia BriaAdministració i gestió d'organitzacions - Pac3 - Solució - Lídia Bria
Administració i gestió d'organitzacions - Pac3 - Solució - Lídia Bria
 
English IMRD
English IMRDEnglish IMRD
English IMRD
 
A need for peer to-peer strong local authentication protocol (p2 pslap) in mo...
A need for peer to-peer strong local authentication protocol (p2 pslap) in mo...A need for peer to-peer strong local authentication protocol (p2 pslap) in mo...
A need for peer to-peer strong local authentication protocol (p2 pslap) in mo...
 
Multi carrier equalization by restoration of redundanc y (merry) for adaptive...
Multi carrier equalization by restoration of redundanc y (merry) for adaptive...Multi carrier equalization by restoration of redundanc y (merry) for adaptive...
Multi carrier equalization by restoration of redundanc y (merry) for adaptive...
 
Pause Photo Prose, un projet de jeu vidéo pour faire comprendre la photographie
Pause Photo Prose, un projet de jeu vidéo pour faire comprendre la photographiePause Photo Prose, un projet de jeu vidéo pour faire comprendre la photographie
Pause Photo Prose, un projet de jeu vidéo pour faire comprendre la photographie
 

Ähnlich wie Performance analysis of transport layer basedhybrid covert channel detection engine

ENTROPY BASED DETECTION ANDBEHAVIORAL ANALYSIS OF HYBRID COVERT CHANNELIN SEC...
ENTROPY BASED DETECTION ANDBEHAVIORAL ANALYSIS OF HYBRID COVERT CHANNELIN SEC...ENTROPY BASED DETECTION ANDBEHAVIORAL ANALYSIS OF HYBRID COVERT CHANNELIN SEC...
ENTROPY BASED DETECTION ANDBEHAVIORAL ANALYSIS OF HYBRID COVERT CHANNELIN SEC...IJNSA Journal
 
A typical analysis of hybrid covert channel using constructive entropy analy...
A typical analysis of hybrid covert channel using constructive  entropy analy...A typical analysis of hybrid covert channel using constructive  entropy analy...
A typical analysis of hybrid covert channel using constructive entropy analy...IJECEIAES
 
A New Way of Identifying DOS Attack Using Multivariate Correlation Analysis
A New Way of Identifying DOS Attack Using Multivariate Correlation AnalysisA New Way of Identifying DOS Attack Using Multivariate Correlation Analysis
A New Way of Identifying DOS Attack Using Multivariate Correlation Analysisijceronline
 
Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...
Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...
Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...CSCJournals
 
Robust encryption algorithm based sht in wireless sensor networks
Robust encryption algorithm based sht in wireless sensor networksRobust encryption algorithm based sht in wireless sensor networks
Robust encryption algorithm based sht in wireless sensor networksijdpsjournal
 
An ensemble model to detect packet length covert channels
An ensemble model to detect packet length covert channelsAn ensemble model to detect packet length covert channels
An ensemble model to detect packet length covert channelsIJECEIAES
 
A Review of Network Layer Attacks and Countermeasures in WSN
A Review of Network Layer Attacks and Countermeasures in WSNA Review of Network Layer Attacks and Countermeasures in WSN
A Review of Network Layer Attacks and Countermeasures in WSNiosrjce
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
TRIDNT: THE TRUST-BASED ROUTING PROTOCOL WITH CONTROLLED DEGREE OF NODE SELFI...
TRIDNT: THE TRUST-BASED ROUTING PROTOCOL WITH CONTROLLED DEGREE OF NODE SELFI...TRIDNT: THE TRUST-BASED ROUTING PROTOCOL WITH CONTROLLED DEGREE OF NODE SELFI...
TRIDNT: THE TRUST-BASED ROUTING PROTOCOL WITH CONTROLLED DEGREE OF NODE SELFI...IJNSA Journal
 
Message Authentication And Source Privacy Using BAC Technique In Wireless Sen...
Message Authentication And Source Privacy Using BAC Technique In Wireless Sen...Message Authentication And Source Privacy Using BAC Technique In Wireless Sen...
Message Authentication And Source Privacy Using BAC Technique In Wireless Sen...theijes
 
A wireless intrusion detection system and a new attack model (synopsis)
A wireless intrusion detection system and a new attack model (synopsis)A wireless intrusion detection system and a new attack model (synopsis)
A wireless intrusion detection system and a new attack model (synopsis)Mumbai Academisc
 
A Secure Payment Scheme with Low Communication and Processing Overhead for Mu...
A Secure Payment Scheme with Low Communication and Processing Overhead for Mu...A Secure Payment Scheme with Low Communication and Processing Overhead for Mu...
A Secure Payment Scheme with Low Communication and Processing Overhead for Mu...Editor IJMTER
 
Detection of Replica Nodes in Wireless Sensor Network: A Survey
Detection of Replica Nodes in Wireless Sensor Network: A SurveyDetection of Replica Nodes in Wireless Sensor Network: A Survey
Detection of Replica Nodes in Wireless Sensor Network: A SurveyIOSR Journals
 
A Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor Network
A Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor NetworkA Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor Network
A Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor NetworkIJERD Editor
 

Ähnlich wie Performance analysis of transport layer basedhybrid covert channel detection engine (20)

ENTROPY BASED DETECTION ANDBEHAVIORAL ANALYSIS OF HYBRID COVERT CHANNELIN SEC...
ENTROPY BASED DETECTION ANDBEHAVIORAL ANALYSIS OF HYBRID COVERT CHANNELIN SEC...ENTROPY BASED DETECTION ANDBEHAVIORAL ANALYSIS OF HYBRID COVERT CHANNELIN SEC...
ENTROPY BASED DETECTION ANDBEHAVIORAL ANALYSIS OF HYBRID COVERT CHANNELIN SEC...
 
A typical analysis of hybrid covert channel using constructive entropy analy...
A typical analysis of hybrid covert channel using constructive  entropy analy...A typical analysis of hybrid covert channel using constructive  entropy analy...
A typical analysis of hybrid covert channel using constructive entropy analy...
 
A New Way of Identifying DOS Attack Using Multivariate Correlation Analysis
A New Way of Identifying DOS Attack Using Multivariate Correlation AnalysisA New Way of Identifying DOS Attack Using Multivariate Correlation Analysis
A New Way of Identifying DOS Attack Using Multivariate Correlation Analysis
 
Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...
Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...
Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...
 
Robust encryption algorithm based sht in wireless sensor networks
Robust encryption algorithm based sht in wireless sensor networksRobust encryption algorithm based sht in wireless sensor networks
Robust encryption algorithm based sht in wireless sensor networks
 
An ensemble model to detect packet length covert channels
An ensemble model to detect packet length covert channelsAn ensemble model to detect packet length covert channels
An ensemble model to detect packet length covert channels
 
A Review of Network Layer Attacks and Countermeasures in WSN
A Review of Network Layer Attacks and Countermeasures in WSNA Review of Network Layer Attacks and Countermeasures in WSN
A Review of Network Layer Attacks and Countermeasures in WSN
 
C010631015
C010631015C010631015
C010631015
 
I1086066
I1086066I1086066
I1086066
 
I1086066
I1086066I1086066
I1086066
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
Ijetr042106
Ijetr042106Ijetr042106
Ijetr042106
 
Container-Beating Approaches for Avoiding Discriminative Cramming Assaults
Container-Beating Approaches for Avoiding Discriminative Cramming AssaultsContainer-Beating Approaches for Avoiding Discriminative Cramming Assaults
Container-Beating Approaches for Avoiding Discriminative Cramming Assaults
 
TRIDNT: THE TRUST-BASED ROUTING PROTOCOL WITH CONTROLLED DEGREE OF NODE SELFI...
TRIDNT: THE TRUST-BASED ROUTING PROTOCOL WITH CONTROLLED DEGREE OF NODE SELFI...TRIDNT: THE TRUST-BASED ROUTING PROTOCOL WITH CONTROLLED DEGREE OF NODE SELFI...
TRIDNT: THE TRUST-BASED ROUTING PROTOCOL WITH CONTROLLED DEGREE OF NODE SELFI...
 
Message Authentication And Source Privacy Using BAC Technique In Wireless Sen...
Message Authentication And Source Privacy Using BAC Technique In Wireless Sen...Message Authentication And Source Privacy Using BAC Technique In Wireless Sen...
Message Authentication And Source Privacy Using BAC Technique In Wireless Sen...
 
A wireless intrusion detection system and a new attack model (synopsis)
A wireless intrusion detection system and a new attack model (synopsis)A wireless intrusion detection system and a new attack model (synopsis)
A wireless intrusion detection system and a new attack model (synopsis)
 
A Secure Payment Scheme with Low Communication and Processing Overhead for Mu...
A Secure Payment Scheme with Low Communication and Processing Overhead for Mu...A Secure Payment Scheme with Low Communication and Processing Overhead for Mu...
A Secure Payment Scheme with Low Communication and Processing Overhead for Mu...
 
Detection of Replica Nodes in Wireless Sensor Network: A Survey
Detection of Replica Nodes in Wireless Sensor Network: A SurveyDetection of Replica Nodes in Wireless Sensor Network: A Survey
Detection of Replica Nodes in Wireless Sensor Network: A Survey
 
P017129296
P017129296P017129296
P017129296
 
A Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor Network
A Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor NetworkA Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor Network
A Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor Network
 

Kürzlich hochgeladen

How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 

Kürzlich hochgeladen (20)

How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 

Performance analysis of transport layer basedhybrid covert channel detection engine

  • 1. International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.6, November 2013 PERFORMANCE ANALYSIS OF TRANSPORT LAYER BASED Hybrid Covert Channel Detection Engine Anjan K1, Srinath N K1, Jibi Abraham2 1 Department Of Computer Science and Engineering, R V College of Engineering, Bangalore,India 2 College of Engineering, Pune, India ABSTRACT Computer network is unpredictable due to information warfareand is prone to various attacks. Such attacks on network compromiseson the most important attribute, the privacy. Most of such attacksare devised using special communication channel called Covert Channel".The word Covert" stands for hidden or nontransparent.Network Covert Channel is concealed communication paths within legitimatenetwork communication that clearly violates security policies laiddown. Non-transparency in covert channel is also referred to as trapdoor.A trapdoor is unintended design within legitimate communication whosemotto is leak information. Subliminal channel, a variant of covert channelworks similarly as network covert channel except that trapdoor is setin cryptographic algorithm. A composition of covert channel with subliminalchannel is the Hybrid Covert Channel". Hybrid covert channelis the homogeneous or heterogeneous mixture of two or more variantsof covert channel either active at same instance or at different instanceof time. Detecting such malicious channel activity plays a vital role inremoving threat to legitimate network.In this paper, we introduce new detection engine for hybrid covert channelin transport layer visualized in TCP and SSL. A setup made onexperimental test bed (DE-HCC9) in RD Lab of our department. Thepurpose of this study is to introduce few performance metrics to evaluatedetection engine and also to understand the multi-trapdoor natureof covert channel. KEYWORDS Covert Channel, Subliminal Channel, Hybrid Covert Channel,Network Security, Trapdoors 1. INTRODUCTION Recent tremendous growth in network has increased more awareness about security aspects amongst spectrum of technical fraternity. It’s unfortunate that there are too few people working on securing channel against threat of covert channel. Detection methods are still at its infancy and depend on the structure of network under consideration. Covert Channel[1,2,3] is a malicious conversation within a legitimate network communication. Covert Channels clearly violate the security policies laid down by the network environment allowing the information leak to the unauthorized or unknown receiver. Covert Channels do not have concrete definition and are scenario oriented. Covertness in these channels exhibit behaviors like multi-trapdoor and protocol hopped where in which channeling is not constrained to pair of communication entities. A fundamental covert channel can be visualized in the figure.1 depicting the covert communication model employed in the covert channel with pre-shared information encoding and decoding scheme between the covert users. DOI : 10.5121/ijnsa.2013.5605 55
  • 2. International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.6, November 2013 Figure 1:Covert Channel Visualization Covert channel can also exist between threads in process or processes in operating system or amongst distributed entities. The focus here is on the design exploration in the specific network protocol and in security protocol. Covert channel is associated with similar terminologies like side channel or stegnographic channel or supraliminal channel, these literature terms are indifferent to each other and stand on the motto of promoting covertness in different forms or scenarios in a communication model over legitimate network. Covert Channels in general exhibit some characteristics: Bandwidth and Covertness Index. The bandwidth is the amount of covert data sent in the network as per the figure 1. This can be formulated using the Shannon’s Channel Capacity – ܶ ‫ܥ‬௖௢௩௘௥௧ ൌ ݈‫݃݋‬ଶ ൬1 ൅ ൰ ܰ Where T is the flow of Covert data and N is the Noise in the channel during transmission. For the network channel with covert communication the total bandwidth of the channel C always will be ‫ܥ‬௖௢௩௘௥௧ ൏ ‫ܥ‬ The Covertness index [16] is the strength of the detection of the trapdoor placed in the network protocols which determines the appropriate detection methods to be employed. The covert channels are broad classification is described in [5]. Hybrid Covert Channel(HCC) [5], a variant of covert channel is defined as homogeneous or heterogeneous composition of two or more covert channel variants existing either at same instance or at different instance of time. Hybrid Covert Channel may be composed of many covert channels and does not have fixed composition. Due to this it is impossible to detect all the possible channels in HCC at real time. HCC can also behave as single coherent channel with characteristics as multi-trapdoor and protocol hopped [10]. Hybrid Covert Channel here as shown in figure 2 is visualized as a combination of simple network covert channel in TCP and subliminal channel in SSL, both being transport layer protocols. 56
  • 3. International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.6, November 2013 Figure 2: Hybrid Covert Channel in Transport Layer Further section of this paper covers various detection methods and system totackle the hybrid covert channel based on the proper detection method. Section2 explores related work. Section 4 gives brief insight about various detectionmethodology and chosen detection method for hybrid covert channel scenario.Section 5 delineates about the system design and implementation. Section 6gives testing of the system in DE-HCC9. Conclusion and future enhancementsis provided in section 7. 2. RELATED WORK Extensive work has been done to devise better detection methods to detect only covert channel either on live wire or on a dataset. In [7] is based on detecting covert shells by monitoring the unusual traffic in the network stream. Covert timing channels are design and detecting in [8] based on packet inter-arrival and modelling whole process as Poisson's distribution. Illegal information flows in covert channels are tracked by tracing the Message Sequence Charts (MSC) in [9]. This paper employs a statistical protocol based detection [11] to detect hybrid covert channel based on analysis made on packet headers. 3. DETECTION METHODS Detection methods [11] are based on the anomaly or signature match in the protocols of the network stack. However, there is new covert language encoding schemes in the protocols that make sit sophisticated to detect it. The channel detection scheme must follow various rounds of checks before the alert is flashed to the administrator of the network and must actively scan the flow of information in the channel. If the same process is carried in after an attack event then the procedure is purely under Network Forensics. If the detection schemes are capable identifying a victimized resource then the process is termed as Covert Channel Identification. There are different methods used to detect a covert channel and it presented below – 3.1. Signature Based Detection Signature-based is also termed as misuse based detection and is carried out actively on the network streams by searching specific patterns or signature of standard protocol. In such cases the algorithm alarms the network of a breach. The popular tool which can detect is NetCat - which is a reverse-shell communication between the internal network and a public network. 57
  • 4. International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.6, November 2013 3.2. Protocol Based Detection Protocol based detection scheme is simple profiling of each protocol used in communication. This is refereed to a deep packet analysis where the each header is scanned to understand its standard values. The standard profile of a protocol is the protocol specification described in their RFC's. Covert_TCPtool manipulates sequence number field, ACK Field in TCP and IP ID in IPv4 packet for the covert communication. 3.3. Behavioral Based Detection Behavioural based detection scheme is sophisticated scheme as it monitors user profiles, resource profiles and reference profiles. It detects the unusual behaviour in the network and is performed in real-time. The detection is based on deviation of usage of the network from normal scenarios. A simple instance can be multiple packet transmission from a source with same sequence number and keeping the traffic of the network it is peak. 3.4. Other Approaches Other Approaches includes detection based on the supervised learning schemes like neural network. Neural network approach involves training the network for `T' period until required accurate values to trigger the alarm process by the detection engine. Scenario based Bayes interference is to set up a system in which each suspicious matched signature (hypothetical attack) found in the monitored data stream is part of a global set (symptoms) and use each global set to calculate, with a Bayes inference, the probability for a known attack to be on hold knowing the P(Hypothetical attack / Symptoms) probability.If the detection engine finds a suspicious scenario which probability value is greater than a set threshold, an alarm process is triggered by the detection engine. Above categorization can also behave as either statistical or probabilistic. A statistical approach is to run the detection engine for `t' hours and record an amount of data `D'. This period is called as learning period and such approach helps to increase the accuracy and also to set the threshold value for the alarm process. A probabilistic approach is to set a probability for the specific event S that occurs after P, Q and R as Y%. This helps the detection engine to tune itself to such event in its running period. 4. SYSTEM DESIGN AND IMPLEMENTATION Major Design Criteria HCC in transport layer is combination of trapdoors placed in TCP and backdoors placed in TLS. The design of the channels with respect to TCP and TLS are different. It works on simple packet capture utility and then analysis of payload and headers. TCP payload will content – TLS/SSL content and process forming the content is specified in the figure 3. 58
  • 5. International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.6, November 2013 Figure 3:Hybrid Covert Channel Formation In figure 3, words marked with red refer to covert process and those with black refer to legitimate process. Channel has to constructed to test the detection engines accuracy and its covertness index. This would suggest the best suited detection schemes to be used for achieve positive detections. The approach here can be combination of Protocol and Signature based schemes also referred to as Statistical Protocol Based Detection. Designing Hybrid Covert Channel takes two different routes discussed in the coming subsections. With reference to figure 3, flow of design follows first subliminal channel in SSL and then the simple network covert channel in TCP. 4.1Designing Subliminal Channel in TLS/ SSL SSL had wide range of cipher algorithm that assist in secured communication. One such algorithm is the DSA that provide authentication service. Subliminal Channel is created in DSA as per [13]. Practically this can done in following ways 1. Covert user generates a random number and provides it during the signature generation process. 2. Covert user replaces system generated public-private keys with the keys that covert process has generated. This may even content bit and bytes of the covert message to be communicated. 3. The Signature component used in the TLS will content the subliminal message generated in 2. This will be sued as communication medium for the reciver to understand the message sent by the covert sender. 4. Programmatically this can be accomplished either with OpenSSL or JSSE secure sockets. 4.2Designing Simple Network Covert Channel in TCP The process of the covert channel generation in network protocol as described in [5] where the covert sender places his covert data in covert vulnerable fields like Sequence Number, Flags, Ack, options and reserved. The focus here is on constructing simple network covert channel, with 59
  • 6. International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.6, November 2013 specific focus on Sequence number, padding and Flags fields of the TCP. Direct access of the network card is required to send this TCP packet by the covert user. This can accomplished in following ways – 1. Jpcap libraries in Java that gives direct control of the interface to developer, here a covert user. 2. BSD socket in Linux where socket creation can be done in the raw mode of operation to create custom packet and informing the kernel not append checksum as this done the developer. 4.3 Design and Implementation of Detection Engine The design of the detection engine takes two stages- one for detecting the subliminal channel in TLS/SSL and the other is for the simple network covert channel in TCP. In TCP based covert channel, TCP packet must be available for diagnosis; this can be accomplished by employing a protocol sniffer. In TLS/ SSL payload, it assumed that covert user has replaced the original supplied keys and also random number is manipulated. In such cases randomness test for both keys and the random number will prove that fact of trapdoor placed by covert party. Detection Engine Algorithm: Step 1: Capture TCP packets from Network Interface using protocol sniffer fromuser specified network device Step 2: Store the TCP packet in database by parsing each fields. Step 3: Analyse the TCP header for the covert vulnerable fields. Step 4: Analyse the signature component in the TLS which is a payload in TCP payload and testifythe key against Randomness tester Step 5: Log the entries of the covert and subliminal activity. Step 6: Compute the performance graph and contentcomputation from the each session data set. detection 5. TESTING Testing results are based on the design consideration made in [6]. DE-HCC9 test bed performance will be based on its detection rate and detection content under different circumstances. The variables to be considered for the performance analysis are listed as follows for `n' nodes in the experimental test bed with `s' sample count and for the session `t'. Let - αbe the total number of packet captured. - β be the number of TCP packets captured - γ cardinality of dataset previously collected - T be the total number of detection made - tbe total number of available TCP packets in database. 60
  • 7. International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.6, November 2013 - Φ Relative Detection Content with respect to β. - η Absolute Detection Content with respect to α Total number of TCP in database or dataset is ‫ݐ‬ൌ ߛ൅ ߚ (1) In the equation 1 if ߛ ൌ 0 and ‫ ݐ‬ൌ ߚ The calculations for detection content are performed using the expressions. ܶ ߶ൌ ߚ ߟൌ ܶ ‫ݐ‬ The threshold value for γ is 10000 packets. ߶൅ߟ 2 Experiments made on DE-HCC9 indicate that packet capturing from thenetwork interface has uniform increase with respect to time. This is visualizedin graph obtained from the test bed show in figure 4. ‫ ߠ ݁ݐܽݎ ݊݋݅ݐܿ݁ݐ݁ܦ ݁݃ܽݎ݁ݒܣ‬ൌ Figure 4: Total No. of Packets (α) Vs Time 61
  • 8. International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.6, November 2013 Figure 5: TCP PacktsVs Time This figure 5 completely depends on the traffic in the subnet and node count.The detection content in TCP for 5 nodes varies between 15% - 30% and average detection rate at 70% - 97% as depicts in the figure 6. Also that detection content depends on number of times covert channel is invoked in that session. If sampling is done for infinity then these percentages decrease to small number or even negligible, which is true in the real network scenario. Figure 6: Average Detection Rate Vs No. of Runs 5. CONCLUSION AND FUTURE WORK Hard Compromise on confidential information and is clearly unacceptable in presence of security measures for legitimate network. Conspiracy between communication parties is not legitimate (Covert Parties) and existence of Hybrid Covert Channel is the strongest threat in communication which should be decommissioned. Conclusion is to build system to detect the activity of Hybrid covert channel in a small scale LAN. This paper has focused such system and also introduces performance metrics to evaluate such system in experimental test bed (DE-HCC9). 62
  • 9. International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.6, November 2013 The project develop is primitive attempt to detect the hybrid covet channel and further improvements include the adding following features - To cover most of the possible covert fields in TCP packet header like acknowledgment bounce and options. Include elimination protocol especially suited for the scenario considered in this project called ``Spoofed Pump'' protocol. Further to include possible hybrid combination of covert in the TCP/IP protocol stack. Analyse the similar possibility of hybrid channelling in case of Ad hoc wireless network since existing of covert channel in routing algorithm headers is possible. ACKNOWLEDGEMENT Anjan K would like to thank Late Dr. V.K Ananthashayana, Erstwhile Head, Department of Computer Science and Engineering, M.S.Ramaiah Institute of Technology, Bangalore, for igniting the passion for research. REFERENCES [1] Vishal Bharti, Practical Development and Deployment of Covert Communication in IPv4, Journal on Theoretical and Applied Information Technology, Apr 2007. [2] Sebastian Zander et.al.: Covert Channels and Counter Measures in Computer Network Protocols, IEEE communication Magazine on survey an tutorials, December 2007. [3] SweetyChauhan, Analysis and Detection of Network Covert channel, Technical Report by Department of computer science and Electrical Engineering,University of Maryland Baltimore County, Dec 2005. [4] EnpingLi , Scott Craver, A supraliminal channel in a wireless phone application, Proceedings of the 11th ACM workshop on Multimedia and security, September 07-08, 2009, Princeton, New Jersey, USA. [5] KoundinyaAnjan and Jibi Abraham, Behaviour Analysis of Transport Layer based Hybrid Covert Channel, Third International Conference on Network Security and Application, Springer-Verlag LNCS series, Chennai, India, Jul 2010. [6] Anjan K Koundinya and Jibi Abraham, Design of Transport Layer Based Hybrid Covert Channel Detection Engine, International Journal of Ad hoc, Sensor and Ubiquitous Computing, Dec 2010. [7] SarderCabuk,CarlaBrodley,ClaySheilds, IP Covert Channel Detection, ACM Transaction on Information and System Security, Vol 12, Article 22, Apr 2009. [8] SarderCabuk,CarlaBrodley,ClaySheilds, IP Covert Timing Channels : Design and Detection, CCS' 04, Oct 2004. [9] Lo`icH'elouet., Claude Jard, Marc Zeitoun, Covert channels detection in protocols using scenarios, SPV'03, April 2003. [10] Steffen Wendzel, Protocol Channels, HAKIN9,Jun 2009. [11] Description of Detection Approaches at url –http://gray-world.net/projects/papers/html/cctde.html [12] Description of JPcap Libraries at url-http://netresearch.ics.uci.edu/kfujii/jpcap/doc/index.html [13] Gustavus J Simmons, The Subliminal Channel and Digital Signatures, Springer-Verlag, 1998. [14] Jerry Banks et.al. Discrete Event System Simulation, Third edition, Prentice Hall, Jan 2001 [15] Description of Randomness test suite - JRandTester at url-http://sourceforge.net/projects/jrandtest 63
  • 10. International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.6, November 2013 [16] Anjan K, Gururaja H S et.al., Covertness Analysis of Subliminal Channelsin Legitimate Communication, ADCONS 2011, LNCS 7135, pp. 582–591, 2012 AUTHOR’S PROFILE Anjan K has received his B.E degree from Visveswariah Technological University, Belgaum, India in 2007 And his master degree from from Department of Computer Science and Engineering, M.S. Ramaiah Institute of Technology, Bangalore, India. He has been awarded Best Performer PG 2010 for his academic excellence. His areas of research includes Network Security and Cryptography, Adhoc Networks, Mobile Computing, Agile Software Engineering. He is currently working as Assistant Professor in Dept. of Computer Science and Engineering, R V College of Engineering. Srinath N K has his M.E degree in Systems Engineering and Operations Research from Roorkee University, in 1986 and PhD degree from AvinashLingum University, India in 2009. His areas of research interests include Operations Research, Parallel and Distributed Computing, DBMS, Microprocessor. His is working as Professor and Head, Dept of Computer Science and Engineering, R V College of Engineering. Jibi Abraham has received her M.S degree in Software Systems from BITS, Rajasthan, India in 1999 and PhD degree from VisveswariahTechnologicalUniversity, Belgaum, India in 2008 in the area of Network Security. Her areas of research interests include Network routing algorithms, Cryptography, Network Security of Wireless Sensor Networks and Algorithms Design.She is working as Professor in Dept. of CEIT, College of Engineering Pune. 64