13.07.2015 Views

Application Layer Covert Channel Analysis and ... - Bill Buchanan

Application Layer Covert Channel Analysis and ... - Bill Buchanan

Application Layer Covert Channel Analysis and ... - Bill Buchanan

SHOW MORE
SHOW LESS
  • No tags were found...

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Z. Kwecka, BSc (Hons) Network Computing, 2006 81 Introduction1.1 Project OverviewThe foundation of the current most popular data channel, the Internet, is made ofprotocols, which allow a considerable amount of “freedom” to their designers. Eachof those protocols was defined based on a number of vendor specificimplementations, in order to provide common procedures for cross vendorcommunication. Thus, every millisecond there is thous<strong>and</strong>s of bits of optional <strong>and</strong>redundant information being exchanged between computers from around the World.Those bits may be employed by intruders, criminals, <strong>and</strong> possibly even terrorists invarious types of malicious activity, since they are usually treated as irrelevant <strong>and</strong>ignored by the security systems. There are very high chances of those bits being usedby perpetrators to implement covert channels, which are a form of secretcommunication medium. This poses a large risk to public <strong>and</strong> private informationconfinement.The overall aim of this Honours project is to investigate data hiding in the <strong>Application</strong><strong>Layer</strong> of Internet protocol suite <strong>and</strong> the main focus is on the detection of covertcommunication. Therefore, research into technology <strong>and</strong> knowledge required to builda successful covert channel detector <strong>and</strong> limiter were conducted. This includedliterature review of recent research publications dealing with covert channels, whitepapers <strong>and</strong> RFCs of specific technologies. In addition a prototype of <strong>Covert</strong> <strong>Channel</strong>Detection System (CCDS) was designed <strong>and</strong> implemented in order to evaluate datagathered. The intentions were to establish whether detection <strong>and</strong> elimination of thecovert channels is possible, <strong>and</strong> where the further work should be conducted in orderto achieve those goals.1.2 BackgroundThe foundations of Internet were built in accordance to 7-layer Open SystemInterconnection (OSI) model, suggested by the International St<strong>and</strong>ard Organisation(ISO). Each of the layers provides well-defined services to the layer directly above<strong>and</strong> exchanges data or control information with corresponding layer on remotemachine. It is also capable of employing services from the layer directly below. Forwell-defined services to operate, protocol stacks were designed to be as universal aspossible, <strong>and</strong> are defined in a way which is called “open”. Most implementations havean open-ended list of protocols that they are capable of providing services to. Forexample, the <strong>Layer</strong> 3 IP protocol carries an 8-bit protocol type field, thus allowing itto transfer 255 different <strong>Layer</strong> 4 protocols, of which only 138 are defined, 115 arefree for further development, <strong>and</strong> 2 are left for testing <strong>and</strong> experimental purposes.IP is the most widely employed protocol for computer networking <strong>and</strong> we can clearlystate that its versatility greatly contributed to this. However, the flexibility of Internetcommunication protocols, which allowed for the dream of simple data sharing, has atrade off, which is security. Optional protocols’ fields <strong>and</strong> variables which aretransmitted only to be ignored or discarded at the receiving end, pose a large threat forinformation confinement. Thus, organizations which permit any form ofcommunication of their employees, or computer systems, with the outside world,consequently consent for an arbitrary data leakage from their networks. Of course the

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!