Skip to main content

A Study on the Covert Channel Detection of TCP/IP Header Using Support Vector Machine

  • Conference paper
Information and Communications Security (ICICS 2003)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2836))

Included in the following conference series:

Abstract

Nowadays, threats of information security have become a big issue in internet environments. Various security solutions are used as such problems’ countermeasure; IDS, Firewall and VPN. However, a TCP/IP protocol based Internet basically has great vulnerability of protocol itself. It is especially possible to establish a covert channel using TCP/IP header fields such as identification, sequence number, acknowledgement number, timestamp and so on [3]. In this paper, we focus on the covert channels using identification field of IP header and the sequence number field of TCP header. To detect such covert channels, our approach uses a Support Vector Machine which has excellent performance in pattern classification problems. Our experiments showed that the proposed method could discern the abnormal cases(including covert channels) from normal TCP/IP traffic using a Support Vector Machine.

This research is supported by Korea University Grant

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. U.S. Department Of Defence, Trusted Computer System Criteria (1985)

    Google Scholar 

  2. McHugh, J.: Covert Channel Analysis, Portland State University (1995)

    Google Scholar 

  3. Rowland, C.H.: Covert Channels in the TCP/IP protocol suite (1996) (first Monday)

    Google Scholar 

  4. Vapnik, V.: The Nature of Statistical Learning Theory. Springer, New York (1995)

    MATH  Google Scholar 

  5. Bueges, C.J.C.: A Tutorial on Support Vector Machines for Patter Recognition. Data Mining and Knowledge Discovery, Boston (1988)

    Google Scholar 

  6. Cortes, C., Vapnik, V.: Support Vector Network. Machine Learning 20, 273–279 (1995)

    MATH  Google Scholar 

  7. Cristianini, N., Shawe-Taylor, J.: An Introduction to Support Vector Machines. Cambridge University Press, Cambridge (2000)

    Google Scholar 

  8. Schölkopf, B., Sung, K.K., Burges, C., Girosi, F., Poggio, T., Vapnik, V.: Comparing support vector machines with Gaussian kernels to radial basis function classifiers. IEEE Transactions on Signal Processing 45(11), 2758–2765 (1997)

    Article  Google Scholar 

  9. Campbell, C., Cristianini, N.: Simple Learning Algorithms for Training Support Vector Machines (1998)

    Google Scholar 

  10. Bellovin, S.M.: Security Problems in the TCP/IP protocol suite. Computer Communication Reviews 19(2), 32–48 (1989)

    Article  Google Scholar 

  11. Mukkamala, S., et al.: Intrusion Detection Using Neural Networks and Support Vector Machines. In: Proceedings of IEEE IJCNN, May 2002, pp. 1702–1707 (2002)

    Google Scholar 

  12. Denning, D.E.: An Intrusion Detection Model. IEEE Transactions on SE (2), 222 (1997)

    Google Scholar 

  13. Pontil, M., Verri, A.: Properties of Support Vector Machines. A.I. Memo No. 1612; CBCL paper No. 152, MIT, Cambridge (1997)

    Google Scholar 

  14. Joachmims, T.: mySVM – a Support Vector Machine, University Dortmund

    Google Scholar 

  15. Giffin, J.: Covert Messaging Through TCP Timestamps. PET 2002 (2000)

    Google Scholar 

  16. Forouzan, B.A.: TCP/IP Protocol Suite. McGraw-Hill, New York

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2003 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Sohn, T., Seo, J., Moon, J. (2003). A Study on the Covert Channel Detection of TCP/IP Header Using Support Vector Machine. In: Qing, S., Gollmann, D., Zhou, J. (eds) Information and Communications Security. ICICS 2003. Lecture Notes in Computer Science, vol 2836. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-39927-8_29

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-39927-8_29

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-20150-2

  • Online ISBN: 978-3-540-39927-8

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics