Detecting Parallel Covert Data Transmission Channels in Video Conferencing Using Machine Learning

Covert communication channels are a concept in which a policy-breaking method is used in order to covertly transmit data from inside an organization to an external or accessible point. VoIP and Video systems are exposed to such attacks on different layers, such as the underlying real-time transport...

Full description

Bibliographic Details
Main Authors: Ofir Joseph, Avshalom Elmalech, Chen Hajaj
Format: Article
Language:English
Published: MDPI AG 2023-02-01
Series:Electronics
Subjects:
Online Access:https://www.mdpi.com/2079-9292/12/5/1091
_version_ 1797615513477578752
author Ofir Joseph
Avshalom Elmalech
Chen Hajaj
author_facet Ofir Joseph
Avshalom Elmalech
Chen Hajaj
author_sort Ofir Joseph
collection DOAJ
description Covert communication channels are a concept in which a policy-breaking method is used in order to covertly transmit data from inside an organization to an external or accessible point. VoIP and Video systems are exposed to such attacks on different layers, such as the underlying real-time transport protocol (RTP) which uses Transmission Control Protocol (TCP) or User Datagram Protocol (UDP) packet streams to punch a hole through Network address translation (NAT). This paper presents different innovative attack methods utilizing covert communication and RTP channels to spread malware or to create a data leak channel between different organizations. The demonstrated attacks are based on a UDP punch hole created using Skype peer-to-peer video conferencing communication. The different attack methods were successfully able to transmit a small text file in an undetectable manner by observing the communication channel, and without causing interruption to the audio/video channels or creating a noticeable disturbance to the quality. While these attacks are hard to detect by the eye, we show that applying classical Machine Learning algorithms to detect these covert channels on statistical features sampled from the communication channel is effective for one type of attack.
first_indexed 2024-03-11T07:27:35Z
format Article
id doaj.art-63c56b6674184874adf3d7e785425010
institution Directory Open Access Journal
issn 2079-9292
language English
last_indexed 2024-03-11T07:27:35Z
publishDate 2023-02-01
publisher MDPI AG
record_format Article
series Electronics
spelling doaj.art-63c56b6674184874adf3d7e7854250102023-11-17T07:31:35ZengMDPI AGElectronics2079-92922023-02-01125109110.3390/electronics12051091Detecting Parallel Covert Data Transmission Channels in Video Conferencing Using Machine LearningOfir Joseph0Avshalom Elmalech1Chen Hajaj2Information Science Department, Bar-Ilan University, Ramat Gan 5290002, IsraelInformation Science Department, Bar-Ilan University, Ramat Gan 5290002, IsraelDepartment of Industrial Engineering and Management, Ariel University, Ariel 4076414, IsraelCovert communication channels are a concept in which a policy-breaking method is used in order to covertly transmit data from inside an organization to an external or accessible point. VoIP and Video systems are exposed to such attacks on different layers, such as the underlying real-time transport protocol (RTP) which uses Transmission Control Protocol (TCP) or User Datagram Protocol (UDP) packet streams to punch a hole through Network address translation (NAT). This paper presents different innovative attack methods utilizing covert communication and RTP channels to spread malware or to create a data leak channel between different organizations. The demonstrated attacks are based on a UDP punch hole created using Skype peer-to-peer video conferencing communication. The different attack methods were successfully able to transmit a small text file in an undetectable manner by observing the communication channel, and without causing interruption to the audio/video channels or creating a noticeable disturbance to the quality. While these attacks are hard to detect by the eye, we show that applying classical Machine Learning algorithms to detect these covert channels on statistical features sampled from the communication channel is effective for one type of attack.https://www.mdpi.com/2079-9292/12/5/1091AI/ML for communication and networkingcovert channelshole punchingsecurityprivacy and content protectionmachine learning
spellingShingle Ofir Joseph
Avshalom Elmalech
Chen Hajaj
Detecting Parallel Covert Data Transmission Channels in Video Conferencing Using Machine Learning
Electronics
AI/ML for communication and networking
covert channels
hole punching
security
privacy and content protection
machine learning
title Detecting Parallel Covert Data Transmission Channels in Video Conferencing Using Machine Learning
title_full Detecting Parallel Covert Data Transmission Channels in Video Conferencing Using Machine Learning
title_fullStr Detecting Parallel Covert Data Transmission Channels in Video Conferencing Using Machine Learning
title_full_unstemmed Detecting Parallel Covert Data Transmission Channels in Video Conferencing Using Machine Learning
title_short Detecting Parallel Covert Data Transmission Channels in Video Conferencing Using Machine Learning
title_sort detecting parallel covert data transmission channels in video conferencing using machine learning
topic AI/ML for communication and networking
covert channels
hole punching
security
privacy and content protection
machine learning
url https://www.mdpi.com/2079-9292/12/5/1091
work_keys_str_mv AT ofirjoseph detectingparallelcovertdatatransmissionchannelsinvideoconferencingusingmachinelearning
AT avshalomelmalech detectingparallelcovertdatatransmissionchannelsinvideoconferencingusingmachinelearning
AT chenhajaj detectingparallelcovertdatatransmissionchannelsinvideoconferencingusingmachinelearning