Patryk Bąk, Jȩdrzej Bieniasz, M. Krzemiński, K. Szczypiorski
{"title":"Application of Perfectly Undetectable Network Steganography Method for Malware Hidden Communication","authors":"Patryk Bąk, Jȩdrzej Bieniasz, M. Krzemiński, K. Szczypiorski","doi":"10.1109/ICFSP.2018.8552057","DOIUrl":null,"url":null,"abstract":"Currently designed malware utilizes various mechanisms allowing to increase the level of its undetectability through static and dynamic analysis. One of such mechanisms may be hiding in overt network traffic proper communication between the attacker and an active malware application on the infected terminal side. In this paper, a design of such a covert channel of communication is proposed, using a StegBlocks method, which is characterized by a proven feature of perfectly undetectable network steganography. An environment was implemented to test the proof of concept of the designed system of covert transmission. Characteristics and limitations of the method were discussed and directions for development were proposed.","PeriodicalId":355222,"journal":{"name":"2018 4th International Conference on Frontiers of Signal Processing (ICFSP)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"9","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 4th International Conference on Frontiers of Signal Processing (ICFSP)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICFSP.2018.8552057","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 9
Abstract
Currently designed malware utilizes various mechanisms allowing to increase the level of its undetectability through static and dynamic analysis. One of such mechanisms may be hiding in overt network traffic proper communication between the attacker and an active malware application on the infected terminal side. In this paper, a design of such a covert channel of communication is proposed, using a StegBlocks method, which is characterized by a proven feature of perfectly undetectable network steganography. An environment was implemented to test the proof of concept of the designed system of covert transmission. Characteristics and limitations of the method were discussed and directions for development were proposed.