13.07.2015 Views

Application Layer Covert Channel Analysis and ... - Bill Buchanan

Application Layer Covert Channel Analysis and ... - Bill Buchanan

Application Layer Covert Channel Analysis and ... - Bill Buchanan

SHOW MORE
SHOW LESS
  • No tags were found...

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Z. Kwecka, BSc (Hons) Network Computing, 2006 567 Discussion, Conclusions <strong>and</strong> Further Work7.1 IntroductionThe main aim of this dissertation was an investigation of covert channels in Internetprotocol stack. In the previous chapters the information collected shown thatimplementation of this data hiding technique is possible, <strong>and</strong> will most likely takeplace in the <strong>Application</strong> <strong>Layer</strong> of TCP/IP model. In addition a suitable prototype ofthe detection system was proposed <strong>and</strong> evaluated. Thus this chapter discusses thefindings, provides conclusions <strong>and</strong> suggests further work that would need to beundertaken in this field, to create virtually covert channel free environment.7.2 Discussion & Prototype EvaluationThe main aim of this dissertation was to investigate covert channel technologies inInternet protocol stack in the context of information confinement. Thus, <strong>Application</strong><strong>Layer</strong> has been identified as the most likely level of data hiding in TCP/IP networkingmodel. Previously there have been many successful approaches to building covertchannels in lower layers of the TCP/IP model (<strong>Buchanan</strong> & Llamas, 2004), howevercurrently their usage is limited <strong>and</strong> possible only in low security networks. Themodern network access control systems (NACSs) are capable of replacing TCP/IPconnection information of the traffic by the use of Proxies or suitably configuredNAT (network address translation) servers, thus they can render useless any covertchannel implementations, operating below <strong>Application</strong> <strong>Layer</strong> (Dyatlov & Castro,2003). Therefore the technologies of data hiding in these lower layers may beinteresting from the point of view of suspect surveillance, where a person underobservation may use low security networking environment, such as internet cafe orSOHO 11 network. However, they may be perceived as ineffective when consideringinformation confinement problem of large institutions, with secure networks.There is a strong tendency, in the recent years, of the information hiding experts toturn their heads towards the relatively new subject of <strong>Application</strong> <strong>Layer</strong> <strong>Covert</strong><strong>Channel</strong>s. Most of the papers in this field agree that for the successful detectionsystem to work, it should employ three different methods of detection, signature,protocol <strong>and</strong> behaviour-based (Borders & Prakash, 2004; Castro, 2003; Dyatlov &Castro, 2003). For this dissertation a system capable of performing this, was designed,however, due to the time restrains only the protocol <strong>and</strong> signature-based detectionsystem was implemented <strong>and</strong> tested. The test results suggested that the system iscapable of successful detection of pre-programmed threat signatures <strong>and</strong> covertchannel implementations which do not comply with the HTTP protocol specification,however detection of unknown implementations or timing channels was impossible.Thus, although fast <strong>and</strong> precise (low level of false-positives) these two methodsproved to have some limitations, <strong>and</strong> behaviour-based detection should be consideredas a must, if the system is expected to detected new or more sophisticated threats.Thus, the findings of this dissertation agree with the results of other researchers of thefield.11 Small-Office-Home-Office

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!