Mobile Agents for Detecting Network Attacks Using Timing Covert Channels

被引:0
|
作者
Bieniasz, Jedrzej [1 ]
Stepkowska, Monika [1 ]
Janicki, Artur [1 ]
Szczypiorski, Krzysztof [1 ]
机构
[1] Warsaw Univ Technol, Div Cybersecur, Inst Telecommun, Warsaw, Poland
关键词
network security; traffic analysis; anomaly detection; intrusion detection; steganography; multi-agent systems; SYSTEMS;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
This article addresses the problem of network attacks using steganographic techniques based on the manipulation of time relationships between IP packets. In the study, an efficient method to detect such attacks is presented. The proposed algorithm is based on the Change Observation Theory, and employs two types of agents: base and flying ones. The agents observe the time parameters of the network traffic, using proposed meta-histograms and trained machine learning algorithms, in the node where they were installed. The results of experiments using various machine learning algorithm are presented and discussed. The study showed that the Random Forest and MLP classifiers achieved the best detection results, yielding an area under the ROC curve (AUC) above 0.85 for the evaluation data. We showed a proof-of-concept for an attack detection method that combined the classification algorithm, the proposed anomaly metrics and the mobile agents. We claim that due to a unique feature of self-regulation, realized by destroying unnecessary agents, the proposed method can establish a new type of multi-agent intrusion detection system that can be applied to a wider group of IT systems.
引用
收藏
页码:1109 / 1130
页数:22
相关论文
共 50 条
  • [1] DETECTING HARDWARE COVERT TIMING CHANNELS
    Venkataramani, Guru
    Chen, Jie
    Doroslovacki, Milos
    IEEE MICRO, 2016, 36 (05) : 17 - 27
  • [2] Detecting Covert Timing Channels Based on Difference Entropy
    Zhang Y.-F.
    Shen Y.
    Yang W.
    Xiao Y.-H.
    Huang L.-S.
    Ruan Jian Xue Bao/Journal of Software, 2019, 30 (09): : 2733 - 2759
  • [3] Detecting Covert Timing Channels Using Non-Parametric Statistical Approaches
    Rezaei, Fahimeh
    Hempel, Michael
    Shrestha, Pradhumna Lal
    Rakshit, Sushanta Mohan
    Sharif, Hamid
    2015 INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE (IWCMC), 2015, : 102 - 107
  • [4] A deep learning approach for detecting covert timing channel attacks using sequential data
    Al-Eidi, Shorouq
    Darwish, Omar
    Chen, Yuanzhu
    Maabreh, Majdi
    Tashtoush, Yahya
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2024, 27 (02): : 1655 - 1665
  • [5] A deep learning approach for detecting covert timing channel attacks using sequential data
    Shorouq Al-Eidi
    Omar Darwish
    Yuanzhu Chen
    Majdi Maabreh
    Yahya Tashtoush
    Cluster Computing, 2024, 27 : 1655 - 1665
  • [6] Are Network Covert Timing Channels Statistical Anomalies?
    Iglesias, Felix
    Zseby, Tanja
    PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2017), 2017,
  • [7] COVERT TIMING CHANNELS FOR IOT OVER MOBILE NETWORKS
    Tan, Yu-an
    Zhang, Xiaosong
    Sharif, Kashif
    Liang, Chen
    Zhang, Quanxin
    Li, Yuanzhang
    IEEE WIRELESS COMMUNICATIONS, 2018, 25 (06) : 38 - 44
  • [8] Covert Channels in the HTTP Network Protocol: Channel Characterization and Detecting Man-in-the-Middle Attacks
    Brown, Erik
    Yuan, Bo
    Johnson, Daryl
    Lutz, Peter
    PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2010, : 56 - 64
  • [9] A Statistical Study of Covert Timing Channels Using Network Packet Frequency
    Chen, Fangyue
    Wang, Yunke
    Song, Heng
    Li, Xiangyang
    2015 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS (ISI), 2015, : 166 - 168
  • [10] Detecting IP covert timing channels by correlating packet timing with memory content
    Stillman, Richard M.
    PROCEEDINGS IEEE SOUTHEASTCON 2008, VOLS 1 AND 2, 2008, : 204 - 209