Detection of Covert Channels Over ICMP Protocol

Autor: Adel Bouhoula, Sirine Sayadi, Tarek Abbes
Přispěvatelé: High School of Communication of Tunis (Sup'com), Université de Carthage - University of Carthage, Université de Sfax - University of Sfax
Jazyk: angličtina
Rok vydání: 2017
Předmět:
Echo (communications protocol)
Computer science
0211 other engineering and technologies
Covert channel
02 engineering and technology
Intrusion detection system
[INFO.INFO-AI]Computer Science [cs]/Artificial Intelligence [cs.AI]
Internet Control Message Protocol
[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]
[SPI]Engineering Sciences [physics]
0202 electrical engineering
electronic engineering
information engineering

ICMP protocol
021110 strategic
defence & security studies

SIMPLE (military communications protocol)
Covert Channel
Network packet
business.industry
ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS
Traffic analysis
020206 networking & telecommunications
Tunneling Detection
Storage Chan- nel
Network Security
ICMP Tunneling
[INFO.INFO-BI]Computer Science [cs]/Bioinformatics [q-bio.QM]
business
Communications protocol
Host (network)
Computer network
Zdroj: 2017 IEEE/ACS 14th International Conference on Computer Systems and Applications (AICCSA)
2017 IEEE/ACS 14th International Conference on Computer Systems and Applications (AICCSA), Oct 2017, Hammamet, Tunisia. pp.1247-1252, ⟨10.1109/AICCSA.2017.60⟩
AICCSA
DOI: 10.1109/AICCSA.2017.60⟩
Popis: International audience; With the growing complexity of networks and communications protocols that become increasingly enormous and extensive, we are confronted with the problem of covert channel that affects the confidentiality and integrity of data sent in the network. Covert channels also known as hidden channels can elude basic security systems such as Intrusion Detection Systems (IDS) and firewalls. We propose in this work a method to monitor and detect the presence of hidden channels that are based on an essential monitoring protocol "Internet Control Message Protocol" (ICMP). We undergo the network traffic with a set of verifications ranging from simple fields verification to more complex pattern matching operations. To validate our idea, we have installed Ptunnel, a tool that allows to tunnel TCP connections to a remote host using ICMP echo request and reply packets. Our experimental results show the possibility to discover such malicious traffic with high performance.
Databáze: OpenAIRE