Zusammenfassung
Dieses Kapitel führt in die Netzwerksteganografie und verdeckte Kanäle ein. Betrachtet werden dabei die grundlegende Terminologie sowie die bekannten Versteckmuster und selektierte Gegenmaßnahmen.
Covert channel analysis can be viewed either as an arcane aspect of computer security having little to do with ,real‘ security issues or as the key to protecting nominally secure systems against a wide variety of both internal and external threats.– John Mc Hugh (1995).
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsNotes
- 1.
Fehlererkennung und -korrektur sind auch Gegenstand von Steganografie, die nicht im Netzwerk stattfindet. Siehe dazu etwa Keller und Magauer [11].
- 2.
Diese Abkürzung ist nicht mit den Inter-packet Gaps zu verwechseln, die ebenfalls mit ,,IPG“ abgekürzt werden.
- 3.
Beispielsweise hängt ein HTTP-Request unter Umständen von einem DNS-Request ab, der zunächst einen Hostnamen in eine IP auflöst.
- 4.
Classifier sind eine Methodenfamilie aus dem Bereich des maschinellen Lernens.
Literatur
Ahsan, K., Kundur, D.: Practical data hiding in TCP/IP. In: Proceedings of Workshop on Multimedia Security at ACM Multimedia, vol. 2, no. 7. ACM (2002)
Carrara, B., Adams, C.: Out-of-band Covert channels – A survey. ACM Comput. Surv. 49(2), 1–36 (2016). Artikel 23, ACM
Department of Defense (DoD): Trusted Computer System Evaluation Criteria, DoD Standard 5200.28, Dezember 1985
Freiling, F.C., Schinzel, S.: Detecting hidden storage side channel vulnerabilities in networked applications. In: Future Challenges in Security and Privacy for Academia and Industry (IFIP SEC 2011), S. 41–55. Springer, Berlin (2011)
Guri, M., Solewicz, Y., Daidakulov, A., Elovici, Y.: Fansmitter: Acoustic Data Exfiltration from (Speakerless) Air-Gapped Computers (2016). arXiv preprint, Nummer 1606.05915
Hanspach, M., Goetz, M.: On Covert acoustical mesh networks in air (2014). arXiv preprint, Nummer 1406.1213
Hanspach, M., Goetz, M.: Recent developments in Covert acoustical communications. In: Proceedings of Sicherheit, S. 243–254. Gesellschaft für Informatik (2014)
Herzberg, A., Shulman, H.: Limiting MitM to MitE Covert-channels. In: Proceedings of the Availability, Reliability and Security (ARES), S. 236–241. IEEE (2013)
Kahn, D.: The Codebreakers. The Story of Secret Writing. Scribner, New York (1996)
Kang, M.H., Moskowitz, I.S., Chincheck, S.: The pump: a decade of Covert fun. In: Proceedings of the 21st Annual Computer Security Applications Conference, S. 352–360 (2005)
Keller, J., Magauer, J.: Error-correcting codes in steganography. In: Proceedings of the ARCS ’06 Workshop on Dependability and Fault Tolerance, S. 52–55. GI (2006)
Lampson, B.W.: A note on the confinement problem. Commun. ACM 16(10), 613–615 (1973). Springer
Lucena, N.B., Lewandowski, G., Chapin, S.J.: Covert channels in IPv6. In: Proceedings of the International Workshop on Privacy Enhancing Technologies, S. 147–166. Springer, Berlin (2005)
Mazurczyk, W., Szczypiorski, K.: Steganography of VoIP streams. In: OTM Confederated International Conferences – On the Move to Meaningful Internet Systems, S. 1001–1018. Springer, Berlin (2008)
Mazurczyk, W., Wendzel, S.: Information hiding – challenge for forensic experts. Commun. ACM 61(1), 86–94 (2018). ACM
Mazurczyk, W., Wendzel, S., Zander, S., Houmansadr, A., Szczypiorski, K.: Information Hiding in Communication Networks. Fundamentals, Mechanisms, Applications, and Countermeasures. IEEE Series on Information & Communication Networks Security, Wiley/IEEE Press, Hoboken (2016)
Munoz, A., Cuadrado, J.: Establishing Covert channels by abusing GSM AT commands, Vortrag im Rahmen der Tagung ,Hack-in-the-Box‘ Amsterdam (HITBAMS) (2018)
Rowland, C.H.: Covert channels in the TCP/IP protocol suite. First Monday 2(5) (1997). http://ojphi.org/ojs/index.php/fm/article/view/528
Simmons, G.J.: The Prisoner’s problem and the subliminal channel. In: Advances in Cryptology – Proceedings of CRYPTO ’83, S. 51–67. Plenum Press (1984)
Sedeeq, I., Coenen, F., Lisitsa, A.: A prediction model based approach to open space steganography detection in HTML webpages. In: Proceedings of the 16th International Workshop on Digital Forensics and Watermarking (IWDW ’17). LNCS, vol. 10431, S. 235–247. Springer, Berlin (2017)
Spiekermann, D., Keller, J., Eggendorfer, T.: Towards Covert channels in cloud environments: a study of implementations in virtual networks. In: Proceedings of the 16th International Workshop on Digital Forensics and Watermarking (IWDW ’17). LNCS, vol. 10431, S. 235–247. Springer, Berlin (2017)
Sui, X.-G., Luo, H.: A steganalysis method based on the distribution of space characters. In: Proceedings of the International Conference on Communications, Circuits and Systems, S. 54–56 (2006)
Tonejc, J., Güttes, S., Kobekova, A., Kaur, J.: Machine learning methods for anomaly detection in BACnet networks. J. Univers. Comput. Sci. (JUCS) 22(9), 1203–1224 (2016)
Tuptuk, N., Hailes, S.: Covert channel attacks in pervasive computing. In: Proceedings of the 2015 IEEE International Conference on Pervasive Computing and Communications (PerCom), S. 236–242. IEEE (2015)
Wendzel, S.: Tunnel und verdeckte Kanäle im Netz. Springer, Berlin (2012)
Wendzel, S.: The problem of traffic normalization within a Covert channel’s network environment learning phase. In: Proc. Sicherheit 2012 (6. Jahrestagung des Fachbereichs Sicherheit). LNI, Bd. 195, S. 149–161. Gesellschaft für Informatik (2012)
Wendzel, S.: Why Johnny can’t use stego: a human-oriented perspective on the application of steganography (2016). arXiv preprint, arXiv:1609.06664
Wendzel, S., Keller, J.: Low-attention forwarding for mobile network Covert channels. In: 12th Conference on Communications and Multimedia Security (CMS 2011). LNCS, Bd. 7025, S. 122–133. Springer, Berlin (2011)
Wendzel, S., Keller, J.: Preventing protocol switching Covert channels. Int. J. Adv. Secur. 5(3&4), 81–93 (2012). IARIA
Wendzel, S., Zander, S.: Detecting protocol switching Covert cHANNELS. In: Proceedings of the Local Computer Networks (LCN), S. 280–283. IEEE (2012)
Wendzel, S., Kahler, B., Rist, T.: Covert channels and their prevention in building automation protocols – a prototype exemplified using BACnet. In: Proceedings of the 2012 IEEE International Conference on Green Computing and Communications, Conference on Internet of Things, and Conference on Cyber, Physical and Social Computing, S. 731–736. IEEE (2012)
Wendzel, S., Zander, S., Fechner, B., Herdin, C.: Pattern-based survey and categorization of network Covert channel techniques. ACM Comput. Surv. (CSUR) 47(3), 1–26 (2015)
Wendzel, S., Mazurczyk, W., Zander, S.: Unified description for network information hiding methods. J. Univers. Comput. Sci. (JUCS) 22(11), 1456–1486 (2016)
Wendzel, S., Mazurczyk, W., Haas, G.: Steganography for cyber-physical systems. J. Cyber Secur. Mobil. (JCSM) 6(2), 105–126 (2017). River Publishers
Wolfe, H.B.: The mobile phone as surveillance device: progress, perils, and protective measures. In: IEEE Computer, S. 50–58. IEEE (2017)
Xu, G., Yang, W., Huang, L.: Hybrid covert channel in LTE-A: modeling and analysis. J. Netw. Comput. Appl. 111, 117–126 (2018). Elsevier
Yarochkin, F.V., Dai, S.-Y., et al.: Towards adaptive Covert communication system. In: Proceedings of the PRDC ’08, S. 153–159. IEEE Computer Society (2008)
Zander, S., Armitage, G., Branch, P.: A survey of Covert channels and countermeasures in computer network protocols. IEEE Commun. Surv. Tutorials 9(3), 44–57 (2007). IEEE
Zhang, X., Tan, Y.A., Liang, C., Li, Y., Li, J.: A Covert channel over VoLTE via adjusting silence periods. In: IEEE Access. IEEE (2018)
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Fachmedien Wiesbaden GmbH, ein Teil von Springer Nature
About this chapter
Cite this chapter
Wendzel, S. (2018). Netzwerksteganografie. In: IT-Sicherheit für TCP/IP- und IoT-Netzwerke. Springer Vieweg, Wiesbaden. https://doi.org/10.1007/978-3-658-22603-9_9
Download citation
DOI: https://doi.org/10.1007/978-3-658-22603-9_9
Published:
Publisher Name: Springer Vieweg, Wiesbaden
Print ISBN: 978-3-658-22602-2
Online ISBN: 978-3-658-22603-9
eBook Packages: Computer Science and Engineering (German Language)