Application of Perfectly Undetectable Network Steganography Method for Malware Hidden Communication

Patryk Bąk, Jȩdrzej Bieniasz, M. Krzemiński, K. Szczypiorski
{"title":"Application of Perfectly Undetectable Network Steganography Method for Malware Hidden Communication","authors":"Patryk Bąk, Jȩdrzej Bieniasz, M. Krzemiński, K. Szczypiorski","doi":"10.1109/ICFSP.2018.8552057","DOIUrl":null,"url":null,"abstract":"Currently designed malware utilizes various mechanisms allowing to increase the level of its undetectability through static and dynamic analysis. One of such mechanisms may be hiding in overt network traffic proper communication between the attacker and an active malware application on the infected terminal side. In this paper, a design of such a covert channel of communication is proposed, using a StegBlocks method, which is characterized by a proven feature of perfectly undetectable network steganography. An environment was implemented to test the proof of concept of the designed system of covert transmission. Characteristics and limitations of the method were discussed and directions for development were proposed.","PeriodicalId":355222,"journal":{"name":"2018 4th International Conference on Frontiers of Signal Processing (ICFSP)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"9","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 4th International Conference on Frontiers of Signal Processing (ICFSP)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICFSP.2018.8552057","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 9

Abstract

Currently designed malware utilizes various mechanisms allowing to increase the level of its undetectability through static and dynamic analysis. One of such mechanisms may be hiding in overt network traffic proper communication between the attacker and an active malware application on the infected terminal side. In this paper, a design of such a covert channel of communication is proposed, using a StegBlocks method, which is characterized by a proven feature of perfectly undetectable network steganography. An environment was implemented to test the proof of concept of the designed system of covert transmission. Characteristics and limitations of the method were discussed and directions for development were proposed.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
完全不可检测网络隐写法在恶意软件隐藏通信中的应用
目前设计的恶意软件利用各种机制,允许通过静态和动态分析来提高其不可检测性的水平。其中一种机制可能隐藏在公开的网络流量中,即攻击者与受感染终端端的活动恶意软件应用程序之间的适当通信。本文提出了一种使用隐写块(StegBlocks)方法设计这种隐蔽通信信道的方法,该方法的特点是具有完全不可检测的网络隐写特性。实现了一个环境来测试所设计的隐蔽传输系统的概念验证。讨论了该方法的特点和局限性,并提出了今后的发展方向。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
On-body Sensing and Signal Analysis for User Experience Recognition in Human-Machine Interaction Objective Approach of 3G/4G Networks Indoor RF Coverage Assessment Statistical Compressive Sensing for Efficient Signal Reconstruction and Classification Towards Empowering Cyber Attack Resiliency Using Steganography Filtering Nonuniformly Sampled Grid-Based Signals
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1