CSP-Based general detection model of network covert storage channels

  • Authors:
  • Hui Zhu;Tingting Liu;Guanghui Wei;Beishui Liu;Hui Li

  • Affiliations:
  • State Key Laboratory of Integrated Service Networks, Xidian University, Xi'an, China, Network and Data Security Key Laboratory of Sichuan Province, Xidian University, Xi'an, China;State Key Laboratory of Integrated Service Networks, Xidian University, Xi'an, China;State Key Laboratory of Integrated Service Networks, Xidian University, Xi'an, China;State Key Laboratory of Integrated Service Networks, Xidian University, Xi'an, China;State Key Laboratory of Integrated Service Networks, Xidian University, Xi'an, China

  • Venue:
  • ICT-EurAsia'13 Proceedings of the 2013 international conference on Information and Communication Technology
  • Year:
  • 2013

Quantified Score

Hi-index 0.00

Visualization

Abstract

A network covert channel is a malicious conversation mechanism, which brings serious security threat to security-sensitive systems and is usually difficult to be detected. Data are hidden in the header fields of protocols in network covert storage channels. In this paper, a general detection model based on formal protocol analysis for identifying possible header fields in network protocols that may be used as covert storage channels is proposed. The protocol is modeled utilizing the Communication Sequential Processes (CSP), in which a modified property of header fields is defined and the header fields are classified into three types in accordance to the extent to which their content can be altered without impairing the communication. At last, verification of the model in Transmission Control Protocol (TCP) shows that the proposed method is effective and feasible.