Analysis of Reversible Network Covert Channels

In the last years, the utilization of information hiding techniques for empowering modern strains of malware has become a serious concern for security experts. Such an approach allows attackers to act in a stealthy manner, for instance, to covertly exfiltrate confidential data or retrieve additional...

Full description

Bibliographic Details
Main Authors: Przemyslaw Szary, Wojciech Mazurczyk, Steffen Wendzel, Luca Caviglione
Format: Article
Language:English
Published: IEEE 2022-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/9758688/
_version_ 1818504487472463872
author Przemyslaw Szary
Wojciech Mazurczyk
Steffen Wendzel
Luca Caviglione
author_facet Przemyslaw Szary
Wojciech Mazurczyk
Steffen Wendzel
Luca Caviglione
author_sort Przemyslaw Szary
collection DOAJ
description In the last years, the utilization of information hiding techniques for empowering modern strains of malware has become a serious concern for security experts. Such an approach allows attackers to act in a stealthy manner, for instance, to covertly exfiltrate confidential data or retrieve additional command &#x0026; control payloads for the operation of malware. Therefore, the deep understanding of data hiding mechanisms is a core requirement, as it allows designing effective countermeasures. Unfortunately, the most recent evolution of information-hiding-capable threats enjoys <italic>reversible</italic> properties, i.e., the abused network flow is restored to its original form. Hence, detection approaches based on the comparison of different traffic samples may not work anymore. In this paper, we further investigate various methods for performing reversible data hiding for network covert channels. Specifically, we extend our previous research by considering different scenarios focusing on IPv4 traffic and HTTP conversations. The results confirm that reversibility can be used in various network conditions and is not impaired by middleboxes. In addition, engineering countermeasures or mitigation techniques could be difficult, thus requiring to consider reversible mechanisms already in the early design stages of a protocol/deployment.
first_indexed 2024-12-10T21:37:44Z
format Article
id doaj.art-1e81f2b5a95647c89d261b1d95f5f505
institution Directory Open Access Journal
issn 2169-3536
language English
last_indexed 2024-12-10T21:37:44Z
publishDate 2022-01-01
publisher IEEE
record_format Article
series IEEE Access
spelling doaj.art-1e81f2b5a95647c89d261b1d95f5f5052022-12-22T01:32:36ZengIEEEIEEE Access2169-35362022-01-0110412264123810.1109/ACCESS.2022.31680189758688Analysis of Reversible Network Covert ChannelsPrzemyslaw Szary0https://orcid.org/0000-0002-7540-2333Wojciech Mazurczyk1https://orcid.org/0000-0002-8509-4127Steffen Wendzel2https://orcid.org/0000-0002-1913-5912Luca Caviglione3https://orcid.org/0000-0001-6466-3354Warsaw University of Technology, Warsaw, PolandWarsaw University of Technology, Warsaw, PolandWorms University of Applied Science, Worms, GermanyNational Research Council of Italy, Genova, ItalyIn the last years, the utilization of information hiding techniques for empowering modern strains of malware has become a serious concern for security experts. Such an approach allows attackers to act in a stealthy manner, for instance, to covertly exfiltrate confidential data or retrieve additional command &#x0026; control payloads for the operation of malware. Therefore, the deep understanding of data hiding mechanisms is a core requirement, as it allows designing effective countermeasures. Unfortunately, the most recent evolution of information-hiding-capable threats enjoys <italic>reversible</italic> properties, i.e., the abused network flow is restored to its original form. Hence, detection approaches based on the comparison of different traffic samples may not work anymore. In this paper, we further investigate various methods for performing reversible data hiding for network covert channels. Specifically, we extend our previous research by considering different scenarios focusing on IPv4 traffic and HTTP conversations. The results confirm that reversibility can be used in various network conditions and is not impaired by middleboxes. In addition, engineering countermeasures or mitigation techniques could be difficult, thus requiring to consider reversible mechanisms already in the early design stages of a protocol/deployment.https://ieeexplore.ieee.org/document/9758688/Covert channelsinformation hidingnetwork securitynetwork steganographyreversible data hiding
spellingShingle Przemyslaw Szary
Wojciech Mazurczyk
Steffen Wendzel
Luca Caviglione
Analysis of Reversible Network Covert Channels
IEEE Access
Covert channels
information hiding
network security
network steganography
reversible data hiding
title Analysis of Reversible Network Covert Channels
title_full Analysis of Reversible Network Covert Channels
title_fullStr Analysis of Reversible Network Covert Channels
title_full_unstemmed Analysis of Reversible Network Covert Channels
title_short Analysis of Reversible Network Covert Channels
title_sort analysis of reversible network covert channels
topic Covert channels
information hiding
network security
network steganography
reversible data hiding
url https://ieeexplore.ieee.org/document/9758688/
work_keys_str_mv AT przemyslawszary analysisofreversiblenetworkcovertchannels
AT wojciechmazurczyk analysisofreversiblenetworkcovertchannels
AT steffenwendzel analysisofreversiblenetworkcovertchannels
AT lucacaviglione analysisofreversiblenetworkcovertchannels