Covert Channels The Silence Must be Heard The Hidden Must be Seen The Secrets Must be Revealed By: Randy Grubb Armstrong Atlantic State University – Cyber.

Slides:



Advertisements
Similar presentations
Introduction to Computers Lecture By K. Ezirim. What is a Computer? An electronic device –Desktops, Notebooks, Mobile Devices, Calculators etc. Require.
Advertisements

Introduction to Computer Graphics Raster Vs. Vector COMMUNICATION TECHNOLOGY.
Steganograp hy By : Uday Deep Singh (IT-2 / 7 th Sem) “The Art Of Hiding Content In Images” 1.
A Digital Imaging Primer Nick Dvoracek Instructional Resources Center University of Wisconsin Oshkosh.
Information Hiding: Watermarking and Steganography
Fundamentals of Information Systems, Second Edition 1 Telecommunications, the Internet, Intranets, and Extranets Chapter 4.
Steganography and Network Security
Steganography Steganography is the art and science of writing hidden messages in such a way that no one apart from the sender and intended recipient even.
Khan, Mohammed Minhajuddin
Bits are Not just for Numbers or Characters Computers store characters as bits or binary digits. Characters from the English-language keyboard can be represented.
Overview of Digital Stenography
Pictures Worth More Than 1000 Words
Steganography Detection Brittnee Morgan December 22, 2004 HPR 108B.
CSCI 530L Steganography and Steganalysis. Administrative issues If you have not yet signed up for a Lab Section, do so now. Most lab sections are full.
Steganography Rayan Ghamri.
1. 2 Discussion Topic: Steganography By Chris Turla, Darien Hager, Jeremy Cheng, Pui Chee Chan INFO 498 – Information Security Autumn ’04.
CS 591 C3S C ryptography & S teganography S ecure S ystem By: Osama Khaleel.
CGS 1000 Introduction to Computers and Technology.
How Images are Represented Bitmap images (Dots used to draw the image) Monochrome images 8 bit grey scale images 24 bit colour Colour lookup tables Vector.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #12 Computer Forensics Analysis/Validation and Recovering Graphic.
Steganography By Robert Summitt and Jiten Patel. What is Steganography It is the art and science of writing a message in a way to where the only the recipient.
Steganography Ryan Sacksteder. Overview What is Steganography? History Forms of Steganography Image Based Steganography Steganalysis Steganography’s Future.
Steganography Cyber Security Camp, July 22, 2015 Rodrigo Sardiñas Dr. David Umphress William Frazier.
Exploring Steganography: Seeing the Unseen Neil F. Johnson Sushil Jajodia George Mason University.
Chapter 3 Application Software.
Steganography detection Roland Cmorik, Martin Šumák.
CHAPTER 2 Communications, Networks, the Internet, and the World Wide Web.
Steganography Ben Lee III Long Truong ECE Spring 2002.
Steganography.
COMP Bitmapped and Vector Graphics Pages Using Qwizdom.
Computing with Digital Media: A Study of Humans and Technology Mark Guzdial, School of Interactive Computing.
Computers Mrs. Doss.
Steganography Steganography refers to any methodology used to hide a message (including text, sound, or picture) in a separate file. Most commonly text.
Watermarking University of Palestine Eng. Wisam Zaqoot May 2010.
Robert Krenn January 21, 2004 Steganography Implementation & Detection.
S TEGANOGRAPHY The Art of Message Hiding. Cryptography: Securing Information in the Digital Age Part 1: Introduction to Steganography Part 2: Hands-on.
Introduction to Steganography & Steganalysis Laura Walters Department of Mathematics Iowa State University Ames, Iowa November 27,
Digital Steganography
Steganography. Outline What is Steganography? History Steganography used nowadays? Terms Steganography methods Steganography Available Software Steganalysis.
Hill Cipher Developed by the mathematician Lester Hill in The encryption algorithm takes m successive plain text and substitute for them m cipher.
OVERVIEW- What is GIS? A geographic information system (GIS) integrates hardware, software, and data for capturing, managing, analyzing, and displaying.
December 4, 2007 Steganography By: Brittany Bugg and Makenzie Young.
Digital Citizenship Created By: Kelli Stinson June 2011.
Raster Graphics. An image is considered to be made up of small picture elements (pixels). Constructing a raster image requires setting the color of each.
Steganography Ed Norris ECE /4/03. Introduction  Undetectable information hiding  Why undetectable?  The message and the communication itself.
STEGANOGRAPHY AND DIGITAL WATERMARKING KAKATIYA INSTITUTE OF TECHNOLOGY AND SCIENCES,WARANGAL.
Implementation of Least Significant Bit Image Steganography and its Steganalaysis By: Deniz Oran Fourth Quarter.
Discovering Computers Fundamentals, Third Edition CGS 1000 Introduction to Computers and Technology Summer 2007.
Digital Images are represented by manipulating this…
Exploring Web Design Chapter 1. Objectives Develop a new perspective of the WWW Learn what makes a website good or bad Discover how to apply objective.
 Image based Steganography  Previous Work  Message Concealment Techniques  Using Punctuation Marks  Using modified Scytale Cipher  S-Tools Software.
Graphics and Image Data Representations 1. Q1 How images are represented in a computer system? 2.
Implementation of Least Significant Bit Image Steganography and its Steganalaysis By: Deniz Oran Third Quarter.
MANAGEMENT OF STEGANOGRAPHY OLALEKAN A. ALABI COSC 454.
Digital Steganography Jared Schmidt. In This Presentation… Digital Steganography Common Methods in Images Network Steganography Uses Steganalysis o Detecting.
Mike Switlick. Overview What is a covert channel? Storage / Timing Requirements Bunratty attack Covert_tcp Questions.
By Colton Delman COSC 316. Greek roots –Steganos : covered –Graphie: writting Hidden communication The hiding of data, information, or messages in many.
A NEW AND SECURE INFORMATION HIDING SYSTEM USING CRYPT- STEGANOGRAPHY Anurag Kumar 424/IC/07.
Benjamin Knapic Nicholas Johnson.  “Tor is free software and an open network that helps you defend against a form of network surveillance that threatens.
Introduction to Computer Security ©2004 Matt Bishop Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester
Text File Hiding in Audio (WAV) File using Least Significant Bit Encoding Steganography A mini software project demonstration on By Satish Bhalshankar.
Digital Steganography
Introduction to Steganography
Vocabulary byte - The technical term for 8 bits of data.
Welcome
Vocabulary byte - The technical term for 8 bits of data.
Steganography.
Visit for more Learning Resources
Steganography Techniques and their use in Anonymity
STEGANOGRAPHY IN IMAGES
Presentation transcript:

Covert Channels The Silence Must be Heard The Hidden Must be Seen The Secrets Must be Revealed By: Randy Grubb Armstrong Atlantic State University – Cyber & Homeland Security Institute

Cyber Capabilities By the turn of the century all known terrorist and criminal groups had a presence on the Internet. –Psychological Warfare –Propaganda –Data Mining –Fundraising/financing –Recruiting –Networking –Information sharing –Planning & coordination –Actual perpetration of their crimes

Why the Internet? Anonymous (real or perceived) –Encryption –Covert Channels/Steganography –Public libraries/Internet cafes/wireless access points –Anonymizers/Proxies (Tor) Geographically Unbounded –People can communicate with one another from virtually anywhere in the world –More than 10,000 Internet Service Providers (ISP) worldwide –Some are sympathetic to the radical cause

Why the Internet? Largely unregulated –Developed as an open interoperable network –No central government authority –Most ISPs do not have the resources or desire to monitor web-site content Inexpensive –Free web hosting –Free accounts

Why the Internet? US and coalition military actions since 9/11 have deprived terrorist organizations their base of operations and training camps. These actions have dispersed terrorist organizations more widely. With the Internet, terrorist organizations can control a worldwide movement without ever meeting. Source: Harvard Gazette: Terror Online and how to counteract it, Ruth Walker, 2004

Netwar Term given to an emerging mode of conflict dealing with the societal relationships between namely terrorists and criminal organizations. –Involves measures short of traditional warfare –Network forms of organization, doctrine, strategy and communication Dispersed and decentralized manner

Netwar Small groups from points around the world utilizing network and Internet technology to: –Communicate –Coordinate –Act

Is This a Secure Site?

What are Covert Channels? Covert Channels –Any communication channel that can be exploited by a process to transfer information in a manner that violates the systems security policy. –In short, covert channels transfer information using non-standard methods –Against the system design –Communication is obscured; unnoticed –Easily bypass current security tools & products

What are Covert Channels? Covert Channels allow multiple parties to communicate ‘ unseen ’ –They hide the fact that a communication is even occurring –Provides privacy and anonymity Unlike encryption, where communication is obvious but obscured –Encryption is easily identified –Clear and visible indications of encryption

Covert Channels Covert Channels work because of human deficiencies –Eye sight –Hearing –Analysis skills Lack of Interest –It ’ s not really a problem, doesn ’ t happen –Prove it to me System Design Discrepancies –Components utilized in unintended manner

Covert Channels Many covert channels will elude detection simply because most individuals have never considered the possibility Perception over rides reality

Covert Channels Covert Channels hide the fact that communication between two or more individuals is occurring.

Potential Damage Corporate Espionage –Loss of competitive advantage Government or Military Activities –Increased threat to National Security –Terrorist Organizations Criminal Activities –Transfer of pornography or commercial software Financial Impact –Transfer of confidential financial data

Known Covert Methods Steganography –Images –Audio Text Manipulation TCP Covert Channels Alternate Data Streams (ADS) Deep or invisible web

Tool Summary Over 300 known tool variation and releases Tools for every Operating System including DOS, Windows, UNIX/Linux, OS2, Mac Wide variety of methodologies and features Most software is freeware or shareware

Origins of Steganography What does Steganography Mean? –Pronounced “STEHG-uh-NAH-gru-fee” –From the Greek Roots “Steganos” or Covered “Graphie” or Writing “Covered Writing” –First Known Usage The early Greeks and Persians used several forms of covered writing to conceal the communication of secret or covert messages Origins date back as far 2500 years ago

Carrier + Payload = Covert Message Carrier – The file that provides cover for and conceals the payload. Payload – The secret message or information that you wish to conceal or communicate. Covert Message – The combination of the payload and the carrier. The covert message file should appear identical to the carrier. Most current stego tools also encrypt the payload to increase security.

Digital Images Digital Images are created by software –Digital camera –Scanner –Graphics program Digital Images are made up of pixels –Represented on a grid –The pixel is the smallest visual component –Resolution & representation 640 x 480 – rows x columns 75 dpi – number of dots per inch Source: WetStone Technologies

Digital Images Color is represented in digital images by three different methods. –Paletted images –True color images –Compressed images

Palette Images Map to a pre-defined color on a table – Pixel represented by table lookup value Source: WetStone Technologies

True Color Images True Color images –Typically 24 bits –Most common format is RGB or Red – Green - Blue –8 bits for each color byte (red, green, blue) –16.7M possible colors Source: WetStone Technologies

Least Significant Bit Steganography “The hiding of data within a digital carrier by slightly altering an insignificant characteristic of the carrier that does not appear to alter the normal rendering of the data” Hosmer, 1999 Source: WetStone Technologies

Altering a True Color Image Image source:

LSB Substitution – bit RED GREEN BLUE Before After Combined Color Individual Colors After LSB Substitution Source: WetStone Technologies

LSB Substitution bit 0 and RED GREEN BLUE Before After Combined Color Individual Colors After LSB Substitution Source: WetStone Technologies

LSB Substitution bits (0-3) RED GREEN BLUE Before After Combined Color Individual Colors After LSB Substitution Source: WetStone Technologies

Color Differences Source: WetStone Technologies

Color Differences Source: WetStone Technologies

Color Differences Can you spot the modified pixel? Source: WetStone Technologies