Learning to Behave: Improving Covert Channel Security with Behavior-Based Designs
نویسندگان
چکیده
Censorship-resistant communication systems generally use real-world cover protocols to establish a covert channel through which uncensored can occur. Unfortunately, many previously proposed inconsistently with the way humans normally those protocols, leading anomalous network traffic patterns that have been shown be discoverable by censors. In this paper, we argue censorship-resistant should follow two behavior-based design properties: (i) behavioral independence: isolate operation of their channels from and (ii) realism: either opportunistically existing genuine protocol instances or run new are modeled after ones. These properties ensure behavior system’s users will not degrade its security. We demonstrate how achieve these evaluation Raven, messaging system uses email identically email. Raven generative adversarial is trained on data control timing sizes messages it sends receives, transferred independently user actions. Our shows that, compared state-of-the-art email-based Mailet system, raises false-positive rate 3% 50% when detecting usage 100% recall.
منابع مشابه
Covert channel for improving VoIP security
In this paper a new way of exchanging information for Voice over Internet Protocol (VoIP) service is presented. With use of digital watermarking and steganography techniques we achieve a covert channel which can be used for different purposes e.g. to improve IP Telephony security or to alternate existing protocols like RTCP (Real-Time Control Protocol). Main advantage of this solution is that i...
متن کاملA Behavior-Based Covert Channel in a MMO
This article proposes a behavior-based covert communication channel in World of Warcraft (WoW), a popular Massively Multiplayer Online Role Playing Game (MMORPG), to transfer data between 2 clients. This is done by modulating binary information onto the senders cast routine and capturing this routine on the receiver. This routine, while demonstrated in WoW, could also be applicable to any other...
متن کاملA Behavior Based Covert Channel within Anti-Virus Updates
This paper presents a new behavior based covert channel utilizing the database update mechanism of anti-virus software. It is highly covert due to unattended, frequent, automatic signature database update operations performed by the software. The design of the covert channel is described; its properties are discussed and demonstrated by a reference implementation. This paper uses these points t...
متن کاملLearning to Behave Socially
Our previous work introduced a methodology for synthesizing and analyzing basic behaviors which served as a substrate for generating a large repertoire of higher{level group interactions (Matari c 1992, Matari c 1993). In this paper we describe how, given the substrate, agents can learn to behave socially, i.e. to maximize average individual by maximizing collective beneet. While this is a well...
متن کاملLearning to Behave by Reading
In this talk, I will address the problem of grounding linguistic analysis in control applications, such as game playing and robot navigation. We assume access to natural language documents that describe the desired behavior of a control algorithm (e.g., game strategy guides). Our goal is to demonstrate that knowledge automatically extracted from such documents can dramatically improve performan...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Proceedings on Privacy Enhancing Technologies
سال: 2022
ISSN: ['2299-0984']
DOI: https://doi.org/10.56553/popets-2022-0068