13.07.2015 Views

Application Layer Covert Channel Analysis and ... - Bill Buchanan

Application Layer Covert Channel Analysis and ... - Bill Buchanan

Application Layer Covert Channel Analysis and ... - Bill Buchanan

SHOW MORE
SHOW LESS
  • No tags were found...

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Z. Kwecka, BSc (Hons) Network Computing, 2006 28Figure 3-6 Protocol-based Detection (Kwecka, 2006)(c) Behaviour-based Detection employs methods of creating profiles of the entirenetwork user. Thus, if any user suddenly changes it usual habits, or behaviourof the user becomes suspicious, an alarm is raised.These various ways of detection of covert channels may be characterised based onthe sensitivity <strong>and</strong> cost (processing) required for their execution. Thus, protocolbaseddetection systems are usually very simple to implement, <strong>and</strong> they do notrequire high processing power, however they can detect only a badly writtenimplementations of covert channels. Signature-based detection is slightly moresensitive <strong>and</strong> will raise an alarm whenever signature of the specific protocolimplementation does not match an entry in a base of allowed message originators.Consequently, the level of processing is usually higher than this of protocol-baseddetection, but still moderate. The behaviour-based approach to the detection ofmalicious packets seems to the most sensitive <strong>and</strong> very efficient, however, still not100% precise <strong>and</strong> prone to false positives. Additionally it is characterised by ahigh processing requirements.3.6 ConclusionsThis chapter has identified three <strong>Application</strong> <strong>Layer</strong> protocols: DNS, HTTP <strong>and</strong> SMTPas the ones, which may be employed to carry a covert payload. Also methods ofcreating covert channels were noted. Thus, an important conclusion about therequirements for covert channel implementation may be drawn, since all form ofcovert channels need some optional fields, values or behaviours to operate. It can beassumed then, that by limiting a number of optional functions of a given protocol,possibility of implementing a covert channel in this protocol is also reduced.Finally, the chapter discussed ways of detecting covert channel implementation <strong>and</strong>identified three different methods, each of different characteristic. Protocol, signature<strong>and</strong> behaviour based detection is possible, however the first one will detect only thebadly constructed threats <strong>and</strong> the last one is capable of detection of virtually anycovert channel. The greater the sensitivity of the detection method, the greater is theprocessing requirement. Thus, the design of the <strong>Covert</strong> <strong>Channel</strong> Detection Systemprototype described in Chapter 4, focused on implementing all three detectionmethods, as various levels of protection in a configuration, which should not affectthe monitored network.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!