DocumentCode :
85010
Title :
Detecting Covert Channels in Computer Networks Based on Chaos Theory
Author :
Hong Zhao ; Yun-Qing Shi
Author_Institution :
Fairleigh Dickinson Univ., Teaneck, NJ, USA
Volume :
8
Issue :
2
fYear :
2013
fDate :
Feb. 2013
Firstpage :
273
Lastpage :
282
Abstract :
Covert channels via the widely used TCP/IP protocols have become a new challenging issue for network security. In this paper, we analyze the information hiding in TCP/IP protocols and propose a new effective method to detect the existence of hidden information in TCP initial sequence numbers (ISNs), which is known as one of the most difficult covert channels to be detected. Our method uses phase space reconstruction to create a processing space called reconstructed phase space, where a statistical model is proposed for detecting covert channels in TCP ISNs. Based on the model, a classification algorithm is developed to identify the existence of information hidden in ISNs. Simulation results have demonstrated that our proposed detection method outperforms the state-of-the-art technique in terms of high detection accuracy and greatly reduced computational complexity. Instead of offline processing as the state-of-the-art does, our new scheme can be used for online detection.
Keywords :
chaos; computer network security; statistical analysis; transport protocols; ISN; TCP initial sequence numbers; TCP/IP protocols; chaos theory; computer networks; covert channel detection; detecting covert channels; network security; phase space reconstruction; statistical model; Chaos; Generators; IP networks; Internet; Operating systems; Protocols; Support vector machines; Covert channel; TCP/IP protocols; network steganalysis; phase space reconstruction;
fLanguage :
English
Journal_Title :
Information Forensics and Security, IEEE Transactions on
Publisher :
ieee
ISSN :
1556-6013
Type :
jour
DOI :
10.1109/TIFS.2012.2231861
Filename :
6374677
Link To Document :
بازگشت