Mobile Agents for Detecting Network Attacks Using Timing Covert Channels

被引:0
|
作者
Bieniasz, Jedrzej [1 ]
Stepkowska, Monika [1 ]
Janicki, Artur [1 ]
Szczypiorski, Krzysztof [1 ]
机构
[1] Warsaw Univ Technol, Div Cybersecur, Inst Telecommun, Warsaw, Poland
关键词
network security; traffic analysis; anomaly detection; intrusion detection; steganography; multi-agent systems; SYSTEMS;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
This article addresses the problem of network attacks using steganographic techniques based on the manipulation of time relationships between IP packets. In the study, an efficient method to detect such attacks is presented. The proposed algorithm is based on the Change Observation Theory, and employs two types of agents: base and flying ones. The agents observe the time parameters of the network traffic, using proposed meta-histograms and trained machine learning algorithms, in the node where they were installed. The results of experiments using various machine learning algorithm are presented and discussed. The study showed that the Random Forest and MLP classifiers achieved the best detection results, yielding an area under the ROC curve (AUC) above 0.85 for the evaluation data. We showed a proof-of-concept for an attack detection method that combined the classification algorithm, the proposed anomaly metrics and the mobile agents. We claim that due to a unique feature of self-regulation, realized by destroying unnecessary agents, the proposed method can establish a new type of multi-agent intrusion detection system that can be applied to a wider group of IT systems.
引用
收藏
页码:1109 / 1130
页数:22
相关论文
共 50 条
  • [21] A performance analysis of authentication using covert timing channels
    Newman, Reed
    Beyah, Raheem
    NETWORKING 2008: AD HOC AND SENSOR NETWORKS, WIRELESS NETWORKS, NEXT GENERATION INTERNET, PROCEEDINGS, 2008, 4982 : 149 - 161
  • [22] Detecting DNS Covert Channels Using Stacking Model
    Yang, Peng
    Li, Ye
    Zang, Yunze
    CHINA COMMUNICATIONS, 2020, 17 (10) : 183 - 194
  • [23] Detecting DNS Covert Channels Using Stacking Model
    Peng Yang
    Ye Li
    Yunze Zang
    中国通信, 2020, 17 (10) : 183 - 194
  • [24] Low-Attention Forwarding for Mobile Network Covert Channels
    Wendzel, Steffen
    Keller, Joerg
    COMMUNICATIONS AND MULTIMEDIA SECURITY, 2011, 7025 : 122 - 133
  • [25] A Distributed Detecting Method for SYN Flood Attacks and Its Implementation Using Mobile Agents
    Narita, Masaki
    Katoh, Takashi
    Bista, Bhed Bahadur
    Takata, Toyoo
    MULTI-AGENT SYSTEM TECHNOLOGIES, PROCEEDINGS, 2009, 5774 : 91 - 102
  • [26] Characterizing the Efficacy of the NRL Network Pump in Mitigating Covert Timing Channels
    Gorantla, Siva K.
    Kadloor, Sachin
    Kiyavash, Negar
    Coleman, Todd P.
    Moskowitz, Ira S.
    Kang, Myong H.
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2012, 7 (01) : 64 - 75
  • [27] Evaluating and Detecting Internal Attacks in a Mobile Robotic Network
    Basan, Elena
    Basan, Alexander
    Makarevich, Oleg
    2018 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY (CYBERC 2018), 2018, : 516 - 524
  • [28] Decision Tree Rule Induction for Detecting Covert Timing Channels in TCP/IP Traffic
    Iglesias, Felix
    Bernhardt, Valentin
    Annessi, Robert
    Zseby, Tanja
    MACHINE LEARNING AND KNOWLEDGE EXTRACTION, CD-MAKE 2017, 2017, 10410 : 105 - 122
  • [29] Detecting Protocol Switching Covert Channels
    Wendzel, Steffen
    Zander, Sebastian
    37TH ANNUAL IEEE CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN 2012), 2012, : 280 - 283
  • [30] A sensitive network jitter measurement for covert timing channels over interactive traffic
    Zhang, Quanxin
    Gong, Hanxiao
    Zhang, Xiaosong
    Liang, Chen
    Tan, Yu-an
    MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (03) : 3493 - 3509