A Combinatorial Approach to Network Covert Communications with Applications in Web Leaks

被引:0
|
作者
Luo, Xiapu [1 ]
Zhou, Peng [1 ]
Chan, Edmond W. W. [1 ]
Chang, Rocky K. C. [1 ]
Lee, Wenke [2 ]
机构
[1] Hong Kong Polytech Univ, Hong Kong, Hong Kong, Peoples R China
[2] Georgia Inst Technol, Atlanta, GA 30332 USA
基金
美国国家科学基金会;
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Various effective network covert channels have recently demonstrated the feasibility of encoding messages into the timing or content of individual network objects, such as data packets and request messages. However, we show in this paper that more robust and stealthy network covert channels can be devised by exploiting the relationship of the network objects. In particular, we propose a combinatorial approach for devising a wide spectrum of covert channels which can meet different objectives based on the channel capacity and channel undetectability. To illustrate the approach, we design WebLeaks and ACKLeaks, two novel covert channels which can leak information through the data and acknowledgment traffic in a web session. We implement both channels and deploy them on the PlanetLab nodes for evaluation. Besides the channel capacity, we apply the state-of-the-art detection schemes to evaluate their camouflage capability. The experiment results show that their capacity can be boosted up by our combinatorial approach, and at the same time they can effectively evade the detection.
引用
收藏
页码:474 / 485
页数:12
相关论文
共 50 条
  • [1] A Combinatorial Approach to Building Navigation Graphs for Dynamic Web Applications
    Wang, Wenhua
    Lei, Yu
    Kacker, Raghu
    Kuhn, Rick
    Sampath, Sreedevi
    Lawrence, James
    2009 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE MAINTENANCE, CONFERENCE PROCEEDINGS, 2009, : 211 - +
  • [2] Covert communications through network configuration messages
    Rios, Ruben
    Onieva, Jose A.
    Lopez, Javier
    COMPUTERS & SECURITY, 2013, 39 : 34 - 46
  • [3] A Game-Theoretic Approach to Covert Communications
    Leong, Alex S.
    Quevedo, Daniel E.
    Dey, Subhrakanti
    2020 IEEE 31ST ANNUAL INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR AND MOBILE RADIO COMMUNICATIONS (IEEE PIMRC), 2020,
  • [4] BLeak: Automatically Debugging Memory Leaks in Web Applications
    Vilk, John
    Berger, Emery D.
    PROCEEDINGS OF THE 39TH ACM SIGPLAN CONFERENCE ON PROGRAMMING LANGUAGE DESIGN AND IMPLEMENTATION, PLDI 2018, 2018, : 15 - +
  • [5] BLEAK: Automatically Debugging Memory Leaks in Web Applications
    Vilk, John
    Berger, Emery D.
    ACM SIGPLAN NOTICES, 2018, 53 (04) : 15 - +
  • [6] BLeak: Automatically Debugging Memory Leaks in Web Applications
    Vilk, John
    Berger, Emery D.
    COMMUNICATIONS OF THE ACM, 2020, 63 (11) : 146 - 153
  • [7] Robust Network Covert Communications Based on TCP and Enumerative Combinatorics
    Luo, Xiapu
    Chan, Edmond W. W.
    Zhou, Peng
    Chang, Rocky K. C.
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2012, 9 (06) : 890 - 902
  • [8] Pinpointing side-channel information leaks in web applications
    Mather, Luke
    Oswald, Elisabeth
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2012, 2 (03) : 161 - 177
  • [10] TridentShell: A Covert and Scalable Backdoor Injection Attack on Web Applications
    Yu, Xiaobo
    Meng, Weizhi
    Zhao, Lei
    Liu, Yining
    INFORMATION SECURITY (ISC 2021), 2021, 13118 : 177 - 194