Stealthy Data Exfiltration via TCP Sequence Numbers based Covert Channel

Jonah Goverman, Ali Tekeoglu
{"title":"Stealthy Data Exfiltration via TCP Sequence Numbers based Covert Channel","authors":"Jonah Goverman, Ali Tekeoglu","doi":"10.1109/cits52676.2021.9618137","DOIUrl":null,"url":null,"abstract":"Ex-filtration of confidential data from a compromised network node become increasingly difficult given modern day defenses, such as deep packet inspection filters, next generation firewalls, anomaly based behavioral intrusion detection systems, and data loss/leak prevention systems. There are various proposed methods in the literature to establish covert channels for stealthy data extraction, however most of them cause anomalies in the network traffic and could be flagged by the state-of-the art defensive network technologies. In this paper, we describe a novel approach, along with a proof-of-concept implementation, for creating a covert channel that fits well within the bounds of RFC-793, utilizing Transmission Control Protocol (TCP) Sequence Numbers. This method encodes the data to be ex-filtrated within TCP sequence numbers, and adds random bytes as payload to each packet to keep the communication compatible with TCP. By designing the proposed data ex-filtration channel to function within RFC standards, we aimed to increase our ability to blend into the regular network traffic and hide from network monitoring tools. We tested our method against an open source intrusion detection system, Snort, and was able to evade detection.","PeriodicalId":211570,"journal":{"name":"2021 International Conference on Computer, Information and Telecommunication Systems (CITS)","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2021-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 International Conference on Computer, Information and Telecommunication Systems (CITS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/cits52676.2021.9618137","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Ex-filtration of confidential data from a compromised network node become increasingly difficult given modern day defenses, such as deep packet inspection filters, next generation firewalls, anomaly based behavioral intrusion detection systems, and data loss/leak prevention systems. There are various proposed methods in the literature to establish covert channels for stealthy data extraction, however most of them cause anomalies in the network traffic and could be flagged by the state-of-the art defensive network technologies. In this paper, we describe a novel approach, along with a proof-of-concept implementation, for creating a covert channel that fits well within the bounds of RFC-793, utilizing Transmission Control Protocol (TCP) Sequence Numbers. This method encodes the data to be ex-filtrated within TCP sequence numbers, and adds random bytes as payload to each packet to keep the communication compatible with TCP. By designing the proposed data ex-filtration channel to function within RFC standards, we aimed to increase our ability to blend into the regular network traffic and hide from network monitoring tools. We tested our method against an open source intrusion detection system, Snort, and was able to evade detection.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
基于隐蔽通道的TCP序列号的秘密数据泄露
考虑到现代防御措施,如深度包检测过滤器、下一代防火墙、基于异常的行为入侵检测系统和数据丢失/泄漏预防系统,从受损网络节点中过滤机密数据变得越来越困难。文献中提出了各种方法来建立隐蔽通道以进行隐形数据提取,但是大多数方法会导致网络流量异常,并且可以通过最先进的防御网络技术进行标记。在本文中,我们描述了一种新颖的方法,以及一个概念验证实现,用于利用传输控制协议(TCP)序列号创建一个非常适合RFC-793边界的隐蔽通道。该方法将需要过滤的数据编码在TCP序列号中,并在每个数据包中添加随机字节作为有效载荷,以保持与TCP的通信兼容。通过设计建议的数据过滤通道,使其在RFC标准中发挥作用,我们的目标是提高我们融入常规网络流量和隐藏网络监控工具的能力。我们针对开源入侵检测系统Snort测试了我们的方法,并且能够逃避检测。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Resource Assignment Strategies for Bags-of-Tasks in Distributed Systems A Software-defined Delay-aware Traffic Load Control for WiFi-based Smart City Services Blockchain and Multiple Linear Regression-based Energy Trading Scheme for Electric Vehicles Location analysis for a grocery store based on a multi-objective optimization approach Handover with Network Slicing in 5G Networks
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1