Catalog Home Page

Pattern-Based survey and categorization of network covert channel techniques

Wendzel, S., Zander, S., Fechner, B. and Herdin, C. (2015) Pattern-Based survey and categorization of network covert channel techniques. ACM Computing Surveys, 47 (3). pp. 1-26.

[img]
Preview
PDF - Authors' Version
Download (439kB) | Preview
Link to Published Version: http://dx.doi.org/10.1145/2684195
*Subscription may be required

Abstract

Network covert channels are used to hide communication inside network protocols. Various techniques for covert channels have arisen in the past few decades. We surveyed and analyzed 109 techniques developed between 1987 and 2013 and show that these techniques can be reduced to only 11 different patterns. Moreover, the majority (69.7%) of techniques can be categorized into only four different patterns (i.e., most techniques we surveyed are similar). We represent the patterns in a hierarchical catalog using a pattern language. Our pattern catalog will serve as a base for future covert channel novelty evaluation. Furthermore, we apply the concept of pattern variations to network covert channels. With pattern variations, the context of a pattern can change. For example, a channel developed for IPv4 can automatically be adapted to other network protocols. We also propose the pattern-based covert channel optimizations pattern hopping and pattern combination. Finally, we lay the foundation for pattern-based countermeasures: whereas many current countermeasures were developed for specific channels, a pattern-oriented approach allows application of one countermeasure to multiple channels. Hence, future countermeasure development can focus on patterns, and the development of real-world protection against covert channels is greatly simplified.

Publication Type: Journal Article
Publisher: ACM Digital Library
Copyright: © 2016 ACM, Inc.
URI: http://researchrepository.murdoch.edu.au/id/eprint/34949
Item Control Page Item Control Page

Downloads

Downloads per month over past year