skip to main content
10.1145/3465481.3470067acmotherconferencesArticle/Chapter ViewAbstractPublication PagesaresConference Proceedingsconference-collections
research-article

pcapStego: A Tool for Generating Traffic Traces for Experimenting with Network Covert Channels

Authors Info & Claims
Published:17 August 2021Publication History

ABSTRACT

The increasing diffusion of malware endowed with steganographic and cloaking capabilities requires tools and techniques for conducting research activities, testing real deployments and elaborating mitigation mechanisms. To investigate attacks targeting network and appliances, a core requirement concerns the availability of suitable traffic traces, which can be used to derive mathematical models for simulation or to develop machine-learning-based countermeasures. Unfortunately, the young nature of threats injecting secrets or cloaking their presence within network traffic, the high protocol-dependent nature of the various embedding processes, and privacy issues, prevent the vast diffusion of datasets to perform research. Therefore, in this paper we present pcapStego, a tool for creating network covert channels within .pcap files. This approach has two major advantages: it allows to prepare large datasets starting from real network traces, and it generates “replayable” conversations useful for both emulating attacks or conduct pentesting campaigns. To prove the effectiveness of the tool, we showcase the generation of network covert channels targeting IPv6 traffic, which is gaining momentum and it is expected to be a major target for future attacks.

References

  1. K. Cabaj, L. Caviglione, W. Mazurczyk, S. Wendzel, A. Woodward, and S. Zander. 2018. The new Threats of Information Hiding: the Road Ahead. IT Professional 20, 3 (2018), 31–39.Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. B. Carrara and C. Adams. 2016. Out-of-band Covert Channels - A Survey. ACM Computing Surveys (CSUR) 49, 2 (2016), 1–36.Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. A. Carrega, L. Caviglione, M. Repetto, and M. Zuppelli. 2020. Programmable Data Gathering for Detecting Stegomalware. In Proceedings of the 2nd International Workshop on Cyber-Security Threats, Trust and Privacy Management in Software-defined and Virtualized Infrastructures (SecSoft). IEEE.Google ScholarGoogle Scholar
  4. L. Caviglione. 2021. Trends and Challenges in Network Covert Channels Countermeasures. Applied Sciences 11, 4 (2021).Google ScholarGoogle Scholar
  5. L. Caviglione, M. Choraś, I. Corona, A. Janicki, W. Mazurczyk, M. Pawlicki, and K. Wasielewska. 2020. Tight Arms Race: Overview of Current Malware Threats and Trends in Their Detection. IEEE Access (2020).Google ScholarGoogle Scholar
  6. L. Caviglione, W. Mazurczyk, M. Repetto, A. Schaffhauser, and M. Zuppelli. 2021. Kernel-level Tracing for Detecting Stegomalware and Covert Channels in Linux Environments. Computer Networks 191(2021), 108010.Google ScholarGoogle ScholarCross RefCross Ref
  7. S. Floyd and V. Paxson. 2001. Difficulties in Simulating the Internet. IEEE/ACm Transactions on Networking 9, 4 (2001), 392–403.Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. J. Fridrich, T. Pevnỳ, and J. Kodovskỳ. 2007. Statistically Undetectable jpeg Steganography: Dead Ends Challenges, and Opportunities. In Proceedings of the 9th workshop on Multimedia & security. ACM, 3–14.Google ScholarGoogle Scholar
  9. D. Gibert, C. Mateu, and J. Planes. 2020. The Rise of Machine Learning for Detection and Classification of Malware: Research Developments, Trends and Challenges. Journal of Network and Computer Applications 153 (2020), 102526.Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. J. Heidemann and C. Papdopoulos. 2009. Uses and Challenges for Network Datasets. In 2009 Cybersecurity Applications & Technology Conference for Homeland Security. IEEE, 73–82.Google ScholarGoogle Scholar
  11. J.-F. Lalande and S. Wendzel. 2013. Hiding Privacy Leaks in Android Applications Using Low-attention Raising Covert Channels. In 2013 International Conference on Availability, Reliability and Security. IEEE, 701–710.Google ScholarGoogle Scholar
  12. B. W. Lampson. 1973. A Note on the Confinement Problem. Commun. ACM 16, 10 (Oct. 1973), 613–615.Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. N. Lucena, G. Lewandowski, and S. Chapin. 2005. Covert Channels in IPv6. In Int. Workshop on Privacy Enhancing Technologies. Springer, 147–166.Google ScholarGoogle Scholar
  14. W. Mazurczyk. 2013. VoIP Steganography and its Detection - A Survey. Comput. Surveys 46, 2 (2013), 1–21.Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. W. Mazurczyk and L. Caviglione. 2014. Steganography in Modern Smartphones and Mitigation Techniques. IEEE Communications Surveys & Tutorials 17, 1 (2014), 334–357.Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. W. Mazurczyk and L. Caviglione. 2015. Information Hiding as a Challenge for Malware Detection. IEEE Security & Privacy 13, 2 (2015), 89–93.Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. W. Mazurczyk, K. Powójski, and L. Caviglione. 2019. IPv6 Covert Channels in the Wild. In Proceedings of the 3rd Central European Cybersecurity Conference. 1–6.Google ScholarGoogle Scholar
  18. M. Ring, S. Wunderlich, D. Scheuring, D. Landes, and A. Hotho. 2019. A Survey of Network-based Intrusion Detection Data Sets. Computers & Security 86(2019), 147–167.Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. J. Saenger, W. Mazurczyk, J. Keller, and L. Caviglione. 2020. VoIP Network Covert Channels to Enhance Privacy and Information Sharing. Future Generation Computer Systems 111 (2020), 96–106.Google ScholarGoogle ScholarCross RefCross Ref
  20. N. Sultana, N. Chilamkurti, W. Peng, and R. Alhadad. 2019. Survey on SDN Based Network Intrusion Detection System Using Machine Learning Approaches. Peer-to-Peer Networking and Applications 12, 2 (2019), 493–501.Google ScholarGoogle ScholarCross RefCross Ref
  21. A. Thakkar and R. Lohiya. 2020. A Review of the Advancement in Intrusion Detection Datasets. Procedia Computer Science 167 (2020), 636–645.Google ScholarGoogle ScholarCross RefCross Ref
  22. S. Zander, G. Armitage, and P. Branch. 2007. A Survey of Covert Channels and Countermeasures in Computer Network Protocols. IEEE Communications Surveys & Tutorials 9, 3 (2007), 44–57.Google ScholarGoogle ScholarDigital LibraryDigital Library

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Other conferences
    ARES '21: Proceedings of the 16th International Conference on Availability, Reliability and Security
    August 2021
    1447 pages
    ISBN:9781450390514
    DOI:10.1145/3465481

    Copyright © 2021 ACM

    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 17 August 2021

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • research-article
    • Research
    • Refereed limited

    Acceptance Rates

    Overall Acceptance Rate228of451submissions,51%

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format .

View HTML Format