Mobile Agents for Detecting Network Attacks Using Timing Covert Channels

被引:0
|
作者
Bieniasz, Jedrzej [1 ]
Stepkowska, Monika [1 ]
Janicki, Artur [1 ]
Szczypiorski, Krzysztof [1 ]
机构
[1] Warsaw Univ Technol, Div Cybersecur, Inst Telecommun, Warsaw, Poland
关键词
network security; traffic analysis; anomaly detection; intrusion detection; steganography; multi-agent systems; SYSTEMS;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
This article addresses the problem of network attacks using steganographic techniques based on the manipulation of time relationships between IP packets. In the study, an efficient method to detect such attacks is presented. The proposed algorithm is based on the Change Observation Theory, and employs two types of agents: base and flying ones. The agents observe the time parameters of the network traffic, using proposed meta-histograms and trained machine learning algorithms, in the node where they were installed. The results of experiments using various machine learning algorithm are presented and discussed. The study showed that the Random Forest and MLP classifiers achieved the best detection results, yielding an area under the ROC curve (AUC) above 0.85 for the evaluation data. We showed a proof-of-concept for an attack detection method that combined the classification algorithm, the proposed anomaly metrics and the mobile agents. We claim that due to a unique feature of self-regulation, realized by destroying unnecessary agents, the proposed method can establish a new type of multi-agent intrusion detection system that can be applied to a wider group of IT systems.
引用
收藏
页码:1109 / 1130
页数:22
相关论文
共 50 条
  • [31] AUTOMATIC DETECTION OF ILLEGAL TRANSMISSION IN A NETWORK (Covert Timing Channels An Entropy Approach)
    2012 THIRD INTERNATIONAL CONFERENCE ON COMPUTING COMMUNICATION & NETWORKING TECHNOLOGIES (ICCCNT), 2012,
  • [32] Covert Timing Channels Detection Based on Auxiliary Classifier Generative Adversarial Network
    Sun, Chonggao
    Chen, Yonghong
    Tian, Hui
    Wu, Shuhong
    IEEE OPEN JOURNAL OF THE COMPUTER SOCIETY, 2021, 2 : 407 - 418
  • [33] A sensitive network jitter measurement for covert timing channels over interactive traffic
    Quanxin Zhang
    Hanxiao Gong
    Xiaosong Zhang
    Chen Liang
    Yu-an Tan
    Multimedia Tools and Applications, 2019, 78 : 3493 - 3509
  • [34] Raising Flags: Detecting Covert Storage Channels Using Relative Entropy
    Chow, Josephine K.
    Li, Xiangyang
    Mountrouidou, Xenia
    PROCEEDINGS OF THE 2017 ACM SIGCSE TECHNICAL SYMPOSIUM ON COMPUTER SCIENCE EDUCATION (SIGCSE'17), 2017, : 759 - 760
  • [35] Raising Flags: Detecting Covert Storage Channels Using Relative Entropy
    Chow, Josephine
    Li, Xiangyang
    Mountrouidou, Xenia
    2017 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS (ISI), 2017, : 25 - 30
  • [36] TCP Covert Timing Channels: Design and Detection
    Luo, Xiapu
    Chan, Edmond W. W.
    Chang, Rocky K. C.
    2008 IEEE INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS & NETWORKS WITH FTCS & DCC, 2008, : 420 - 429
  • [37] Probabilistic timing covert channels: to close or not to close?
    Alessandra Di Pierro
    Chris Hankin
    Herbert Wiklicky
    International Journal of Information Security, 2011, 10 : 83 - 106
  • [38] Modeling Packet Rate Covert Timing Channels
    Shrestha, Pradhumna L.
    Hempel, Michael
    Alahmad, Mahmoud
    Sharif, Hamid
    2013 9TH INTERNATIONAL CONFERENCE ON INNOVATIONS IN INFORMATION TECHNOLOGY (IIT), 2013,
  • [39] Covert timing channels: analyzing WEB traffic
    Nasseralfoghara, Mehrdad
    Hamidi, Hamid Reza
    JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2022, 18 (02) : 117 - 126
  • [40] Covert timing channels: analyzing WEB traffic
    Mehrdad Nasseralfoghara
    Hamid Reza Hamidi
    Journal of Computer Virology and Hacking Techniques, 2022, 18 : 117 - 126