Learning to Behave: Improving Covert Channel Security with Behavior-Based Designs

نویسندگان

چکیده

Censorship-resistant communication systems generally use real-world cover protocols to establish a covert channel through which uncensored can occur. Unfortunately, many previously proposed inconsistently with the way humans normally those protocols, leading anomalous network traffic patterns that have been shown be discoverable by censors. In this paper, we argue censorship-resistant should follow two behavior-based design properties: (i) behavioral independence: isolate operation of their channels from and (ii) realism: either opportunistically existing genuine protocol instances or run new are modeled after ones. These properties ensure behavior system’s users will not degrade its security. We demonstrate how achieve these evaluation Raven, messaging system uses email identically email. Raven generative adversarial is trained on data control timing sizes messages it sends receives, transferred independently user actions. Our shows that, compared state-of-the-art email-based Mailet system, raises false-positive rate 3% 50% when detecting usage 100% recall.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Covert channel for improving VoIP security

In this paper a new way of exchanging information for Voice over Internet Protocol (VoIP) service is presented. With use of digital watermarking and steganography techniques we achieve a covert channel which can be used for different purposes e.g. to improve IP Telephony security or to alternate existing protocols like RTCP (Real-Time Control Protocol). Main advantage of this solution is that i...

متن کامل

A Behavior-Based Covert Channel in a MMO

This article proposes a behavior-based covert communication channel in World of Warcraft (WoW), a popular Massively Multiplayer Online Role Playing Game (MMORPG), to transfer data between 2 clients. This is done by modulating binary information onto the senders cast routine and capturing this routine on the receiver. This routine, while demonstrated in WoW, could also be applicable to any other...

متن کامل

A Behavior Based Covert Channel within Anti-Virus Updates

This paper presents a new behavior based covert channel utilizing the database update mechanism of anti-virus software. It is highly covert due to unattended, frequent, automatic signature database update operations performed by the software. The design of the covert channel is described; its properties are discussed and demonstrated by a reference implementation. This paper uses these points t...

متن کامل

Learning to Behave Socially

Our previous work introduced a methodology for synthesizing and analyzing basic behaviors which served as a substrate for generating a large repertoire of higher{level group interactions (Matari c 1992, Matari c 1993). In this paper we describe how, given the substrate, agents can learn to behave socially, i.e. to maximize average individual by maximizing collective beneet. While this is a well...

متن کامل

Learning to Behave by Reading

In this talk, I will address the problem of grounding linguistic analysis in control applications, such as game playing and robot navigation. We assume access to natural language documents that describe the desired behavior of a control algorithm (e.g., game strategy guides). Our goal is to demonstrate that knowledge automatically extracted from such documents can dramatically improve performan...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Proceedings on Privacy Enhancing Technologies

سال: 2022

ISSN: ['2299-0984']

DOI: https://doi.org/10.56553/popets-2022-0068