13.07.2015 Views

Application Layer Covert Channel Analysis and ... - Bill Buchanan

Application Layer Covert Channel Analysis and ... - Bill Buchanan

Application Layer Covert Channel Analysis and ... - Bill Buchanan

SHOW MORE
SHOW LESS
  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Z. Kwecka, BSc (Hons) Network Computing, 2006 51The results from this experiment were used to analyse server responses to various datahiding techniques <strong>and</strong> their graphical representation is attached to the report inAppendix 2. Thus, out of five scenarios tested, the number of error response codesreturned in the Data Hiding Agent path, were different only for Linear SpacingModification scenario. The difference, however, was negligible (0.1%), so weconfider badly written scripts rather that server software to be the reason behind them.Thus, the theoretical data hiding scenarios can be implemented in practice, withoutaffecting HTTP operations <strong>and</strong> countermeasures should be developed to stop suchimplementations.6.2.4 Experiment 4 – Browser Signature RecognitionEvery web browser installed at test network hosts were configured with the IP addressof the Inline Filtering Agent (running on Host 3) for the purpose of this experiment.Then we have tried browsing the Internet using various browsers (those previouslyspecified) on different machines simultaneously. The IFA passed this test matching100% of the requests to their originators. Thus, we have added an early version ofData Hiding Proxy inline with the request path, between the hosts <strong>and</strong> the InlineFiltering Agent. The results were very surprising, as the filtering agent recognizedsignature mismatch in every request. This was later identified as being caused by thedefault behaviour of the proxies based on HTTP Proxy Foundation, since it usesDictionary Collection to store headers <strong>and</strong> rebuild requests, messages passing throughData Hiding Proxy had their headers ordered alphabetically. This behaviour wasconsequently modified so that Data Hiding Proxy produced exact copies of originalrequests, when hiding techniques are not employed (this new version was use toproduce scenarios in Experiment 3). Then the test was repeated using the new versionof hiding software <strong>and</strong> this time once again the filtering agent has reported 100%match of the requests’ signatures to the originators specified in ‘User-Agent’ field.However, when the data hiding techniques were used the IFA did not report anymismatches.In this experiment we have proven that recognition of different HTTP client softwarebased on unique signature is possible. Thus, by analysis of the message syntax we areable to check the value supplied in the ‘User-Agent’ header by the originator.However the, data hiding techniques, were able to pass through filtering agent withoutraising alerts <strong>and</strong> caused concerns to the definition of the signatures. We think thefault was in the signatures being defined in a way do distinguish between differentbrowsers, i.e. identified browser specific aspects, however did not evaluate anycommon factors in the requests. Thus, we think that in order to produce signatures,that could be employed to detect data hiding techniques usage, a full syntax of themessage must be considered. For the set of browsers used following factors whereidentified that should produce more precise signatures:- usage of title-casing to produce header names- single space between colon at the end of header name <strong>and</strong> header value- no linear spacing characters at the end of value field- set of headers used to produce requestsThese factors were introduced to signature checking process of the Inline FilteringProxy version used in Experiment 5.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!