Covert Channels John Dabney. Covert Channels   “... any communication channel that can be exploited by a process to transfer information in a manner.

Slides:



Advertisements
Similar presentations
Information Hiding and Covert Channels
Advertisements

1 SANS Technology Institute - Candidate for Master of Science Degree 1 Steganography Then and Now John Hally May 2012 GIAC GSEC, GCIA, GCIH, GCFA, GCWN,
Copyright 2003, Marchany Hiding Text in MP3 Files Randy Marchany VA Tech Computing Center Blacksburg, VA
An Exploration in the Detection of Hidden Data in Audio Bit Streams Presented by: John Monk CS 525, Spring Semester 2002
Steganograp hy By : Uday Deep Singh (IT-2 / 7 th Sem) “The Art Of Hiding Content In Images” 1.
Introduction to Watermarking Anna Ukovich Image Processing Laboratory (IPL)
Information Hiding: Watermarking and Steganography
A New Scheme For Robust Blind Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Mar 5, 2002 Department.
Voice over IP: A growing cadre of criminals is hiding secret messages in voice data. From: "Voice Over IP: The VoIP Steganography Threat". IEEE Spectrum.
Steganography in digital images. Copyright protection “Signature” or “watermark” of the creator/sender Invisible Hard to remove Robust to processing 64.
What is Steganography? def’n: the art and science of hiding information by embedding it in some other data. cryptography - render message unintelligible.
VIPER DSPS 1998 Slide 1 A DSP Solution to Error Concealment in Digital Video Eduardo Asbun and Edward J. Delp Video and Image Processing Laboratory (VIPER)
Steganography Steganography is the art and science of writing hidden messages in such a way that no one apart from the sender and intended recipient even.
Digital Watermarking for Multimedia Security R. Chandramouli MSyNC:Multimedia Systems, Networking, and Communications Lab Stevens Institute of Technology.
Overview of Digital Stenography
In the last part of the course we make a review of selected technical problems in multimedia signal processing First problem: CONTENT SECURITY AND WATERMARKING.
Multimedia Security Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Nov 20, 2002 Department of Computer.
CS 591 C3S C ryptography & S teganography S ecure S ystem By: Osama Khaleel.
1 Enabling Secure Internet Access with ISA Server.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #12 Computer Forensics Analysis/Validation and Recovering Graphic.
Steganography Ryan Sacksteder. Overview What is Steganography? History Forms of Steganography Image Based Steganography Steganalysis Steganography’s Future.
By : Nimish Agarwal.  … are those which are neither designed nor intended to transfer information at all.  … are based on "transmission by storage into.
Exploring Steganography: Seeing the Unseen Neil F. Johnson Sushil Jajodia George Mason University.
Steganography detection Roland Cmorik, Martin Šumák.
© Copyright 2012 STI INNSBRUCK Tor project: Anonymity online.
Steganography.
Secure Steganography in Audio using Inactive Frames of VoIP Streams
Steganography Steganography refers to any methodology used to hide a message (including text, sound, or picture) in a separate file. Most commonly text.
Information Security Principles (ESGD4222)
Watermarking University of Palestine Eng. Wisam Zaqoot May 2010.
Robert Krenn January 21, 2004 Steganography Implementation & Detection.
Introduction to Multimedia Security Topics Covered in this Course Multimedia Security.
Steganography “Hiding in Plain Sight” Gary Alan Davis, D.Sc. Department of Computer & Information Systems.
Digital Steganography
Agenda Definitions Why cryptography is important? Available technologies Benefits & problems.
December 4, 2007 Steganography By: Brittany Bugg and Makenzie Young.
Computer Forensics, Steganography and Cryptography and Related Ethical Issues. Edilasio Pereira Russell Braun Team 8.
Covert Channels Thomas Arnold CSCI 5235/Summer /12/2010.
Johann A. Briffa Mahesh Theru Manohar Das A Robust Method For Imperceptible High- Capacity Information Hiding in Images. INTRODUCTION  The art of Hidden.
Steganography Ed Norris ECE /4/03. Introduction  Undetectable information hiding  Why undetectable?  The message and the communication itself.
STEGANOGRAPHY AND DIGITAL WATERMARKING KAKATIYA INSTITUTE OF TECHNOLOGY AND SCIENCES,WARANGAL.
STEGANOGRAPHY Sonya Febiatiningsih ( ) for further detail, please visit
CMSC 691 IAUMBC Analysis and Detection of Network Covert Channels Sweety Chauhan CMSC 691 IA 30 th Nov. 2005
Part V Electronic Commerce Security Online Security Issues Overview Managing Risk Computer Security Classifications. Security.
Covert Channels in IPv6 Norka B. Lucena, Grzegorz Lewandowski, and Steve J. Chapin Syracuse University PET 2005, Cavtat, Croatia May 31 st, 2005.
Cryptographic Anonymity Project Alan Le
VoIP Steganography and Its Detection – A Survey 1 ACM Computing Surveys (CSUR) Volume 46 Issue 2, November 2013 WOJCIECH MAZURCZYK Warsaw University of.
Implementation of Steganographic Techniques Danny Friedheim pd. 2.
Modified Onion Routing GYANRANJAN HAZARIKA AND KARAN MIRANI.
Zahoor Ahmed J.P.Cances V.Meghdadi Cryptographic Spread Spectrum Relay Communication NGMAST 2008.
Lisa Fujii Cole, E. (2003). Hiding in Plain Sight: Steganography and the Art of Covert Communication. Indianapolis, Indiana: Wiley Publishing, Inc.
Digital Steganography Jared Schmidt. In This Presentation… Digital Steganography Common Methods in Images Network Steganography Uses Steganalysis o Detecting.
DIGITAL COMMUNICATION. Introduction In a data communication system, the output of the data source is transmitted from one point to another. The rate of.
Covert Channels Eric Pennington COSC480. Common Network Threats  Viruses, Trojans, Worms, etc.  Password Attacks  Eavesdropping  Port Scanning  Not.
By Colton Delman COSC 316. Greek roots –Steganos : covered –Graphie: writting Hidden communication The hiding of data, information, or messages in many.
A NOVEL STEGANOGRAPHY METHOD VIA VARIOUS ANIMATION EFFECTS IN POWERPOINT FILES Internal guide Mrs. Hilda By Syed Ashraf ( ) Sushil sharma ( )
Introduction to Computer Security ©2004 Matt Bishop Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester
Text File Hiding in Audio (WAV) File using Least Significant Bit Encoding Steganography A mini software project demonstration on By Satish Bhalshankar.
Digital Steganography
Introduction to Steganography
THE CATHOLIC UNIVERSITY OF AMERICA School of Engineering / Department of Electrical Engineering and Computer Science A Non-Algorithmic File-Type Independent.
Welcome
STEGANOGRAPHY.
Model-based Steganography
Steganography.
Visit for more Learning Resources
Steganography Techniques and their use in Anonymity
COVERT STORAGE CHANNEL MODULE
STEGANOGRAPHY IN IMAGES
Introduction to Multimedia Security Topics Covered in this Course
Presentation transcript:

Covert Channels John Dabney

Covert Channels   “... any communication channel that can be exploited by a process to transfer information in a manner that violates the system's security policy. - - National Institute of Standards and Technology  “a path of communication that was not designed to be used for communication.” - Matt Bishop

Steganography  “ ”  “the practice of concealing information in channels that superficially appear benign.”  “While cryptography is about protecting the content of messages, steganography is about concealing their very existence.” – Fabien Petitcolas

Properties  Existence  Hide the fact that communication is taking place  Bandwidth  Unused  Detectability  Evaluation  Ease of implementation  Range  Permissibility  Probability of detection  Anonymity  “Unobservable”  “Unlinkable”

Usage  Network  Wireless - Corrupted headers  Modifying header fields  Optional/mandatory – bits used infrequently raise risk of detection  Modifying existing traffic  Audio and Video stenograms  Encryption  Canary trap and Digital watermarking

An example  aphy/image%5Fdowngrading/

64 KB hidden

129 KB hidden

194 KB hidden

258 KB hidden

323 KB hidden

388 KB “hidden”

452 KB “hidden”

Detection  Comparison with original  Artifacts from applications used to hide information  Statistical analysis  Wireless - High error rates

Mitigation  Not complete elimination  Isolation  Bandwidth - time  Randomness/Uniformity  Compression  Changing formats  Disabling certain traffic

Questions? ????

Bibliography   Bishop, Matt. Introduction to Computer Security. Massachusetts: Pearson Education, Inc.,   “Canary Trap.” Wikipedia. April 26,   “Covert Channels.” Wikipedia. April 26,   Dunbar, Bret. A detailed look at Steganographic Techniques and their use in an Open-Systems Environment. SANS Institute. 01/18/ &portal=67dfc17e34bed372c83983ad0cbd5629. April 26, &portal=67dfc17e34bed372c83983ad0cbd5629   Owens, Mark. A Discussion of Covert Channels and Steganography. SANS/GIAC GSEC 1.3. March 19, &portal=67dfc17e34bed372c83983ad0cbd5629. April 26, &portal=67dfc17e34bed372c83983ad0cbd5629   Petitcolas, Fabien. “the information hiding homepage digital watermarking and steganography.” (Nov. 2006) Fabien a. p. petitcolas. April 26,   Sbrusch, Raymond. Network Covert Channels: Subversive Secrecy. SANS Institute &portal=67dfc17e34bed372c83983ad0cbd5629. April 26, &portal=67dfc17e34bed372c83983ad0cbd5629   “Steganography.” Wikipedia. April 26,   Wingate, Jim. The Perfect Dead Drop: The Use of Cyberspace for Covert Communications. BackBone Security.com. April 26,