Download presentation
Presentation is loading. Please wait.
1
COVERT STORAGE CHANNEL MODULE
Xenia Mountrouidou College of Charleston Xiangyang Li Johns Hopkins University Information Security Institute
2
Outline Start reserving your topology Learning Goals Audience
Background Variations
3
Reserve topology Go to: https://goo.gl/KTOVfA
Use the Rspec: berPaths/files/csc_lab_rspec.txt
4
Learning Goals Generate regular traffic based on a distribution
Generate covert storage traffic channel traffic with TCP flag manipulation Analyze the TCP packets Detect the presence of covert storage traffic in a network using entropy Use Wireshark, GENI
5
Audience CS majors Some background work is needed
6
Background Linux, SFTP and Wireshark Covert Storage Channels TCP Flags
GENI
7
What are Covert Storage Channels?
A Covert Storage Channel is a communications channel that is hidden within the medium of legitimate communications channel. Covert channels manipulate a communications medium in an unexpected or unconventional way by using resources that are not meant for communication in order to transmit information in an undetectable manner. How do we use TCP Flags as carriers? A Covert Storage Channel uses the TCP Flag (TF) header field in a network packet, a six-bit field used to set up TCP connection for transmitting messages. The two communicating parties, start exchanging messages based on pre-agreed coding scheme.
8
TCP Flags as Carriers
9
How Cybercrime Exploits Covert Storage Channels
Researchers focus on methods to more reliable CSC channels for the need of privacy and protection of communication parties. Conspirators seek advanced steganographic tools for purposes of: Data Exfiltration Command Control
10
CSC Lab for non-CS Majors
Draw Topology Generate regular traffic Use TCP flag manipulation Generate covert storage channel traffic Detect the presence of covert storage traffic Experiments on GENI GENI: Virtual laboratory for networking and distributed systems research and education
11
Simulating Covert Storage Channels
Real machines Small Network CSC traffic Regular traffic You control all these!
12
Variations GENI Desktop Usage of different TCP header field as CSC
Usage of Split-Join Network for transmitting CSC traffic
13
Questions? LET’S EXPERIMENT!
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.