Protocol Proxy: An FTE-based Covert Channel

02/25/2020
by   Jonathan Oakley, et al.
0

In a hostile network environment, users must communicate without being detected. This involves blending in with the existing traffic. In some cases, a higher degree of secrecy is required. We present a proof-of-concept format transforming encryption (FTE)-based covert channel for tunneling TCP traffic through protected static protocols. Protected static protocols are UDP-based protocols with variable fields that cannot be blocked without collateral damage, such as power grid failures. We (1) convert TCP traffic to UDP traffic, (2) introduce observation-based FTE, and (3) model interpacket timing with a deterministic Hidden Markov Model (HMM). The resulting Protocol Proxy has a very low probability of detection and is an alternative to current covert channels. We tunnel a TCP session through a UDP protocol and guarantee delivery. Observation-based FTE ensures traffic cannot be detected by traditional rule-based analysis or DPI. A deterministic HMM ensures the Protocol Proxy accurately models interpacket timing to avoid detection by side-channel analysis. Finally, the choice of a protected static protocol foils stateful protocol analysis and causes collateral damage with false positives.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
01/22/2021

A Decentralized Analysis of Multiparty Protocols

Protocols provide the unifying glue in concurrent and distributed softwa...
research
12/31/2019

Physical Layer Security Protocol for Poisson Channels for Passive Man-in-the-middle Attack

In this work, we focus on the classical optical channel having Poissonia...
research
04/13/2021

Balboa: Bobbing and Weaving around Network Censorship

We introduce Balboa, a link obfuscation framework for censorship circumv...
research
05/13/2021

The Inductive Approach to Verifying Cryptographic Protocols

Informal arguments that cryptographic protocols are secure can be made r...
research
02/17/2020

Constructive expressive power of population protocols

Population protocols are a model of distributed computation intended for...
research
02/26/2023

APT Encrypted Traffic Detection Method based on Two-Parties and Multi-Session for IoT

APT traffic detection is an important task in network security domain, w...
research
04/02/2019

Multiparty Session Type-safe Web Development with Static Linearity

Modern web applications can now offer desktop-like experiences from with...

Please sign up or login with your details

Forgot password? Click here to reset