Skip to main content

Netzwerksteganografie

  • Chapter
  • First Online:
  • 10k Accesses

Zusammenfassung

Dieses Kapitel führt in die Netzwerksteganografie und verdeckte Kanäle ein. Betrachtet werden dabei die grundlegende Terminologie sowie die bekannten Versteckmuster und selektierte Gegenmaßnahmen.

Covert channel analysis can be viewed either as an arcane aspect of computer security having little to do with ,real‘ security issues or as the key to protecting nominally secure systems against a wide variety of both internal and external threats.– John Mc Hugh (1995).

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   34.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Notes

  1. 1.

    Fehlererkennung und -korrektur sind auch Gegenstand von Steganografie, die nicht im Netzwerk stattfindet. Siehe dazu etwa Keller und Magauer [11].

  2. 2.

    Diese Abkürzung ist nicht mit den Inter-packet Gaps zu verwechseln, die ebenfalls mit ,,IPG“ abgekürzt werden.

  3. 3.

    Beispielsweise hängt ein HTTP-Request unter Umständen von einem DNS-Request ab, der zunächst einen Hostnamen in eine IP auflöst.

  4. 4.

    Classifier sind eine Methodenfamilie aus dem Bereich des maschinellen Lernens.

Literatur

  1. Ahsan, K., Kundur, D.: Practical data hiding in TCP/IP. In: Proceedings of Workshop on Multimedia Security at ACM Multimedia, vol. 2, no. 7. ACM (2002)

    Google Scholar 

  2. Carrara, B., Adams, C.: Out-of-band Covert channels – A survey. ACM Comput. Surv. 49(2), 1–36 (2016). Artikel 23, ACM

    Google Scholar 

  3. Department of Defense (DoD): Trusted Computer System Evaluation Criteria, DoD Standard 5200.28, Dezember 1985

    Google Scholar 

  4. Freiling, F.C., Schinzel, S.: Detecting hidden storage side channel vulnerabilities in networked applications. In: Future Challenges in Security and Privacy for Academia and Industry (IFIP SEC 2011), S. 41–55. Springer, Berlin (2011)

    Google Scholar 

  5. Guri, M., Solewicz, Y., Daidakulov, A., Elovici, Y.: Fansmitter: Acoustic Data Exfiltration from (Speakerless) Air-Gapped Computers (2016). arXiv preprint, Nummer 1606.05915

    Google Scholar 

  6. Hanspach, M., Goetz, M.: On Covert acoustical mesh networks in air (2014). arXiv preprint, Nummer 1406.1213

    Google Scholar 

  7. Hanspach, M., Goetz, M.: Recent developments in Covert acoustical communications. In: Proceedings of Sicherheit, S. 243–254. Gesellschaft für Informatik (2014)

    Google Scholar 

  8. Herzberg, A., Shulman, H.: Limiting MitM to MitE Covert-channels. In: Proceedings of the Availability, Reliability and Security (ARES), S. 236–241. IEEE (2013)

    Google Scholar 

  9. Kahn, D.: The Codebreakers. The Story of Secret Writing. Scribner, New York (1996)

    Google Scholar 

  10. Kang, M.H., Moskowitz, I.S., Chincheck, S.: The pump: a decade of Covert fun. In: Proceedings of the 21st Annual Computer Security Applications Conference, S. 352–360 (2005)

    Google Scholar 

  11. Keller, J., Magauer, J.: Error-correcting codes in steganography. In: Proceedings of the ARCS ’06 Workshop on Dependability and Fault Tolerance, S. 52–55. GI (2006)

    Google Scholar 

  12. Lampson, B.W.: A note on the confinement problem. Commun. ACM 16(10), 613–615 (1973). Springer

    Google Scholar 

  13. Lucena, N.B., Lewandowski, G., Chapin, S.J.: Covert channels in IPv6. In: Proceedings of the International Workshop on Privacy Enhancing Technologies, S. 147–166. Springer, Berlin (2005)

    Google Scholar 

  14. Mazurczyk, W., Szczypiorski, K.: Steganography of VoIP streams. In: OTM Confederated International Conferences – On the Move to Meaningful Internet Systems, S. 1001–1018. Springer, Berlin (2008)

    Google Scholar 

  15. Mazurczyk, W., Wendzel, S.: Information hiding – challenge for forensic experts. Commun. ACM 61(1), 86–94 (2018). ACM

    Google Scholar 

  16. Mazurczyk, W., Wendzel, S., Zander, S., Houmansadr, A., Szczypiorski, K.: Information Hiding in Communication Networks. Fundamentals, Mechanisms, Applications, and Countermeasures. IEEE Series on Information & Communication Networks Security, Wiley/IEEE Press, Hoboken (2016)

    Google Scholar 

  17. Munoz, A., Cuadrado, J.: Establishing Covert channels by abusing GSM AT commands, Vortrag im Rahmen der Tagung ,Hack-in-the-Box‘ Amsterdam (HITBAMS) (2018)

    Google Scholar 

  18. Rowland, C.H.: Covert channels in the TCP/IP protocol suite. First Monday 2(5) (1997). http://ojphi.org/ojs/index.php/fm/article/view/528

  19. Simmons, G.J.: The Prisoner’s problem and the subliminal channel. In: Advances in Cryptology – Proceedings of CRYPTO ’83, S. 51–67. Plenum Press (1984)

    Google Scholar 

  20. Sedeeq, I., Coenen, F., Lisitsa, A.: A prediction model based approach to open space steganography detection in HTML webpages. In: Proceedings of the 16th International Workshop on Digital Forensics and Watermarking (IWDW ’17). LNCS, vol. 10431, S. 235–247. Springer, Berlin (2017)

    Google Scholar 

  21. Spiekermann, D., Keller, J., Eggendorfer, T.: Towards Covert channels in cloud environments: a study of implementations in virtual networks. In: Proceedings of the 16th International Workshop on Digital Forensics and Watermarking (IWDW ’17). LNCS, vol. 10431, S. 235–247. Springer, Berlin (2017)

    Google Scholar 

  22. Sui, X.-G., Luo, H.: A steganalysis method based on the distribution of space characters. In: Proceedings of the International Conference on Communications, Circuits and Systems, S. 54–56 (2006)

    Google Scholar 

  23. Tonejc, J., Güttes, S., Kobekova, A., Kaur, J.: Machine learning methods for anomaly detection in BACnet networks. J. Univers. Comput. Sci. (JUCS) 22(9), 1203–1224 (2016)

    Google Scholar 

  24. Tuptuk, N., Hailes, S.: Covert channel attacks in pervasive computing. In: Proceedings of the 2015 IEEE International Conference on Pervasive Computing and Communications (PerCom), S. 236–242. IEEE (2015)

    Google Scholar 

  25. Wendzel, S.: Tunnel und verdeckte Kanäle im Netz. Springer, Berlin (2012)

    Google Scholar 

  26. Wendzel, S.: The problem of traffic normalization within a Covert channel’s network environment learning phase. In: Proc. Sicherheit 2012 (6. Jahrestagung des Fachbereichs Sicherheit). LNI, Bd. 195, S. 149–161. Gesellschaft für Informatik (2012)

    Google Scholar 

  27. Wendzel, S.: Why Johnny can’t use stego: a human-oriented perspective on the application of steganography (2016). arXiv preprint, arXiv:1609.06664

    Google Scholar 

  28. Wendzel, S., Keller, J.: Low-attention forwarding for mobile network Covert channels. In: 12th Conference on Communications and Multimedia Security (CMS 2011). LNCS, Bd. 7025, S. 122–133. Springer, Berlin (2011)

    Google Scholar 

  29. Wendzel, S., Keller, J.: Preventing protocol switching Covert channels. Int. J. Adv. Secur. 5(3&4), 81–93 (2012). IARIA

    Google Scholar 

  30. Wendzel, S., Zander, S.: Detecting protocol switching Covert cHANNELS. In: Proceedings of the Local Computer Networks (LCN), S. 280–283. IEEE (2012)

    Google Scholar 

  31. Wendzel, S., Kahler, B., Rist, T.: Covert channels and their prevention in building automation protocols – a prototype exemplified using BACnet. In: Proceedings of the 2012 IEEE International Conference on Green Computing and Communications, Conference on Internet of Things, and Conference on Cyber, Physical and Social Computing, S. 731–736. IEEE (2012)

    Google Scholar 

  32. Wendzel, S., Zander, S., Fechner, B., Herdin, C.: Pattern-based survey and categorization of network Covert channel techniques. ACM Comput. Surv. (CSUR) 47(3), 1–26 (2015)

    Google Scholar 

  33. Wendzel, S., Mazurczyk, W., Zander, S.: Unified description for network information hiding methods. J. Univers. Comput. Sci. (JUCS) 22(11), 1456–1486 (2016)

    Google Scholar 

  34. Wendzel, S., Mazurczyk, W., Haas, G.: Steganography for cyber-physical systems. J. Cyber Secur. Mobil. (JCSM) 6(2), 105–126 (2017). River Publishers

    Google Scholar 

  35. Wolfe, H.B.: The mobile phone as surveillance device: progress, perils, and protective measures. In: IEEE Computer, S. 50–58. IEEE (2017)

    Google Scholar 

  36. Xu, G., Yang, W., Huang, L.: Hybrid covert channel in LTE-A: modeling and analysis. J. Netw. Comput. Appl. 111, 117–126 (2018). Elsevier

    Google Scholar 

  37. Yarochkin, F.V., Dai, S.-Y., et al.: Towards adaptive Covert communication system. In: Proceedings of the PRDC ’08, S. 153–159. IEEE Computer Society (2008)

    Google Scholar 

  38. Zander, S., Armitage, G., Branch, P.: A survey of Covert channels and countermeasures in computer network protocols. IEEE Commun. Surv. Tutorials 9(3), 44–57 (2007). IEEE

    Google Scholar 

  39. Zhang, X., Tan, Y.A., Liang, C., Li, Y., Li, J.: A Covert channel over VoLTE via adjusting silence periods. In: IEEE Access. IEEE (2018)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Fachmedien Wiesbaden GmbH, ein Teil von Springer Nature

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Wendzel, S. (2018). Netzwerksteganografie. In: IT-Sicherheit für TCP/IP- und IoT-Netzwerke. Springer Vieweg, Wiesbaden. https://doi.org/10.1007/978-3-658-22603-9_9

Download citation

Publish with us

Policies and ethics