ProtoLeaks: A Reliable and Protocol-Independent Network Covert Channel

Abstract: We propose a theoretical framework for a network covert channel based on enumerative combinatorics. It offers protocol independence and avoids detection by using a mimicry defense. Using a network monitoring phase, traffic is analyzed to detect which application-layer protocols are allowed through the firewalls. Using these results, a covert channel is built based on permutations of benign network objects, such as FTP commands and HTTP requests to different web servers. Any protocol that offers reliability guarantees can be plugged into the framework. This includes any protocol that is built on top of the TCP protocol. The framework closely mimics the behavioral statistics of the legitimate traffic, making the covert channel very hard to detect.

Conference: International Conference on Information System Security 2012

Paper: PDF

Belgian. IT Security. Bug Bounty Hunter.

Arne Swinnen

Belgian. IT Security. Bug Bounty Hunter.

One Comment

Leave a Reply

Your email address will not be published. Required fields are marked *