Mobile Agents for Detecting Network Attacks Using Timing Covert Channels

被引:0
|
作者
Bieniasz, Jedrzej [1 ]
Stepkowska, Monika [1 ]
Janicki, Artur [1 ]
Szczypiorski, Krzysztof [1 ]
机构
[1] Warsaw Univ Technol, Div Cybersecur, Inst Telecommun, Warsaw, Poland
关键词
network security; traffic analysis; anomaly detection; intrusion detection; steganography; multi-agent systems; SYSTEMS;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
This article addresses the problem of network attacks using steganographic techniques based on the manipulation of time relationships between IP packets. In the study, an efficient method to detect such attacks is presented. The proposed algorithm is based on the Change Observation Theory, and employs two types of agents: base and flying ones. The agents observe the time parameters of the network traffic, using proposed meta-histograms and trained machine learning algorithms, in the node where they were installed. The results of experiments using various machine learning algorithm are presented and discussed. The study showed that the Random Forest and MLP classifiers achieved the best detection results, yielding an area under the ROC curve (AUC) above 0.85 for the evaluation data. We showed a proof-of-concept for an attack detection method that combined the classification algorithm, the proposed anomaly metrics and the mobile agents. We claim that due to a unique feature of self-regulation, realized by destroying unnecessary agents, the proposed method can establish a new type of multi-agent intrusion detection system that can be applied to a wider group of IT systems.
引用
收藏
页码:1109 / 1130
页数:22
相关论文
共 50 条
  • [41] Probabilistic timing covert channels: to close or not to close?
    Di Pierro, Alessandra
    Hankin, Chris
    Wiklicky, Herbert
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2011, 10 (02) : 83 - 106
  • [42] Simulation Analysis of Probabilistic Timing Covert Channels
    Guo Yunchuan
    Yin Lihua
    Zhou Yuan
    Li Chao
    Guo Li
    NAS: 2009 IEEE INTERNATIONAL CONFERENCE ON NETWORKING, ARCHITECTURE, AND STORAGE, 2009, : 325 - +
  • [43] Designing Rich-Secure Network Covert Timing Channels Based on Nested Lattices
    Liu, Weiwei
    Liu, Guangjie
    Ji, Xiaopeng
    Zhai, Jiangtao
    Dai, Yuewei
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2019, 13 (04): : 1866 - 1883
  • [44] Detecting Covert Channels in FPS Online Games
    Zander, Sebastian
    2017 IEEE 42ND CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN), 2017, : 555 - 558
  • [45] A Novel Analytical Model and its Test Bed Verification for Network Covert Timing Channels
    Shrestha, Pradhumna L.
    Hempel, Michael
    Rezaei, Fahimeh
    Sharif, Hamid
    2015 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2015, : 227 - 235
  • [46] Covert Channels Using Mobile Device's Magnetic Field Sensors
    Matyunin, Nikolay
    Szefer, Jakub
    Biedermann, Sebastian
    Katzenbeisser, Stefan
    2016 21ST ASIA AND SOUTH PACIFIC DESIGN AUTOMATION CONFERENCE (ASP-DAC), 2016, : 525 - 532
  • [47] Survey of Microarchitectural Side and Covert Channels, Attacks, and Defenses
    Jakub Szefer
    Journal of Hardware and Systems Security, 2019, 3 (3) : 219 - 234
  • [48] Teaching Network Covert Channels using a Hands-on Approach
    Trabelsi, Zouheir
    PROCEEDINGS OF THE 2020 IEEE GLOBAL ENGINEERING EDUCATION CONFERENCE (EDUCON 2020), 2020, : 323 - 328
  • [49] Covert Timing Channels Detection Based on Image Processing Using Deep Learning
    Al-Eidi, Shorouq
    Darwish, Omar
    Chen, Yuanzhu
    Elkhodr, Mahmoud
    ADVANCED INFORMATION NETWORKING AND APPLICATIONS, AINA-2022, VOL 3, 2022, 451 : 546 - 555
  • [50] Detecting JitterBug covert timing channel with sparse embedding
    Zhai, Jiangtao
    Wang, Mingqian
    Liu, Guangjie
    Dai, Yuewei
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (11) : 1509 - 1519