13.07.2015 Views

Application Layer Covert Channel Analysis and ... - Bill Buchanan

Application Layer Covert Channel Analysis and ... - Bill Buchanan

Application Layer Covert Channel Analysis and ... - Bill Buchanan

SHOW MORE
SHOW LESS
  • No tags were found...

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Z. Kwecka, BSc (Hons) Network Computing, 2006 556.3 ConclusionsFirst set of experiments performed has proved that recognition of the connectionoriginator is possible, eve if the user agent field of the HTTP protocol is obfuscated.Therefore signatures of four commonly used browsers were identified for the use inthe prototype. Then the set of information sent in a request for a certain web pageswas reduced, <strong>and</strong> from the response codes received the conclusions may be drownthat, a percentage of headers in HTTP st<strong>and</strong>ard is sent in the request but never used bythe receiving server in connection with typical requests. Thus, Accept, Accept-Encoding <strong>and</strong> Accept-Language have been identified as headers, which in Englishspeaking environment, are redundant if using typical multifunction web browser.The evaluation of the prototype has been performed <strong>and</strong> all the covert channelscenarios, that the IFA was designed to detect, has raised an alert when executed.Additionally five agents of various MS Windows based software were detected. Thus,it has been established that some application hijack proxy setting of the InternetExplorer.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!