DocumentCode
85010
Title
Detecting Covert Channels in Computer Networks Based on Chaos Theory
Author
Hong Zhao ; Yun-Qing Shi
Author_Institution
Fairleigh Dickinson Univ., Teaneck, NJ, USA
Volume
8
Issue
2
fYear
2013
fDate
Feb. 2013
Firstpage
273
Lastpage
282
Abstract
Covert channels via the widely used TCP/IP protocols have become a new challenging issue for network security. In this paper, we analyze the information hiding in TCP/IP protocols and propose a new effective method to detect the existence of hidden information in TCP initial sequence numbers (ISNs), which is known as one of the most difficult covert channels to be detected. Our method uses phase space reconstruction to create a processing space called reconstructed phase space, where a statistical model is proposed for detecting covert channels in TCP ISNs. Based on the model, a classification algorithm is developed to identify the existence of information hidden in ISNs. Simulation results have demonstrated that our proposed detection method outperforms the state-of-the-art technique in terms of high detection accuracy and greatly reduced computational complexity. Instead of offline processing as the state-of-the-art does, our new scheme can be used for online detection.
Keywords
chaos; computer network security; statistical analysis; transport protocols; ISN; TCP initial sequence numbers; TCP/IP protocols; chaos theory; computer networks; covert channel detection; detecting covert channels; network security; phase space reconstruction; statistical model; Chaos; Generators; IP networks; Internet; Operating systems; Protocols; Support vector machines; Covert channel; TCP/IP protocols; network steganalysis; phase space reconstruction;
fLanguage
English
Journal_Title
Information Forensics and Security, IEEE Transactions on
Publisher
ieee
ISSN
1556-6013
Type
jour
DOI
10.1109/TIFS.2012.2231861
Filename
6374677
Link To Document