Covert Channel Detection and Analysis System Based on Data Mining
نویسندگان
چکیده
Covert channels and tunneling approaches are becoming a severe threat to information security. Penetration tools are employed to transit sensitive information through authorized streams. Since many current solutions are based on expert’s experiences or latter-wit, a self-learning detection and analysis system is starved for. A data mining framework for Covert Channel Detection and Analysis System (CCDAS) is presented in this paper. It utilizes protocol analysis method to reassemble each network connections according to all kinds of protocol specifications, and apply data mining programs to construct features that can accurately distinguish the abnormal behaviors of covert channels from the normal activities. The main components of CCDAS (namely Protocol Analyzer, Feature Constructor and Class Identifier) work together and detect various emerging covert channels automatically. Key-Words: information security, covert channel, data mining
منابع مشابه
Covert Channel Detection Using Process Query Systems
In this paper we use traffic analysis to investigate a stealthy form of data exfiltration. We present an approach to detect covert channels based on a Process Query System (PQS), a new type of information retrieval technology in which queries are expressed as process descriptions.
متن کاملPurdue University Graduate School Thesis Acceptance
Cabuk, Serdar Ph.D., Purdue University, December, 2006. Network Covert Channels: Design, Analysis, Detection, and Elimination. Major Professors: Carla E. Brodley and Eugene H. Spafford. Indirect communication channels have been effectively employed in the communications world to bypass mechanisms that do not permit direct communication between unauthorized parties. Such covert channels emerge a...
متن کاملGraduate School Thesis Acceptance
Cabuk, Serdar Ph.D., Purdue University, December, 2006. Network Covert Channels: Design, Analysis, Detection, and Elimination. Major Professors: Carla E. Brodley and Eugene H. Spafford. Indirect communication channels have been effectively employed in the communications world to bypass mechanisms that do not permit direct communication between unauthorized parties. Such covert channels emerge a...
متن کاملDetection of Covert Channel Encoding in Network Packet Delays
Covert channels are mechanisms for communicating information in ways that are difficult to detect. Data exfiltration can be an indication that a computer has been compromised by an attacker even when other intrusion detection schemes have failed to detect a successful attack. Covert timing channels use packet interarrival times, not header or payload embedded information, to encode covert messa...
متن کاملAn Effective Approach to Detect Malware that Exploit Information Hiding in Android Devices
A Malware is a very big threat in today’s computing world. It continues to grow in volume and evolve in complexity. Modern malware uses advanced techniques to hide from static and dynamic analysis tools. The existing system uses classification based and regression based approach for detection. The proposed system utilizes the classification based approach and regression based approach for detec...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2004