skip to main content
10.1145/3600160.3605021acmotherconferencesArticle/Chapter ViewAbstractPublication PagesaresConference Proceedingsconference-collections
research-article

Network Covert Channels in Routing Protocols

Published:29 August 2023Publication History

ABSTRACT

Computer networks play a key role in everyday lives. To guarantee fail-safe operation, routing protocols are used that enable dynamic routing via redundant paths. Because of this, routing protocols like RIP or OSPF play an important role in modern network infrastructures. The widespread use together with the mostly missing traffic monitoring of these protocols provide a possible base to exploit these protocols for network steganographic channels. In this paper, we present a novel storage covert channel based on the OSPF routing protocol. We analyzed the protocol in detail with the help of hiding patterns to identify protocol fields that might be suitable for covert communication. We provide a proof-of-concept implementation of our covert channel inside a simulated network, which demonstrates the possibility of covert communication in a routing protocol. Our evaluation covers detectability and countermeasures, steganographic bandwidth and robustness. Furthermore, we sketch an application scenario where such a covert channel can be deployed.

References

  1. Stefan Achleitner, Quinn Burke, Patrick McDaniel, Trent Jaeger, Thomas La Porta, and Srikanth Krishnamurthy. 2021. MLSNet: A Policy Complying Multilevel Security Framework for Software Defined Networking. IEEE Transactions on Network and Service Management 18, 1 (2021), 729–744. https://doi.org/10.1109/TNSM.2020.3045998Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Peter Backs, Steffen Wendzel, and Jörg Keller. 2012. Dynamic routing in covert channel overlays based on control protocols. In 7th International Conference for Internet Technology and Secured Transactions, ICITST 2012, London, United Kingdom, December 10-12, 2012, Nick Savage, Safwan El Assad, and Charles A. Shoniregun (Eds.). IEEE, New York, 32–39. https://ieeexplore.ieee.org/document/6470978/Google ScholarGoogle Scholar
  3. Andrew D. Banasiewicz. 2013. Marketing database analytics: transforming data for competitive advantage. Routledge, New York. https://doi.org/10.4324/9780203076460Google ScholarGoogle ScholarCross RefCross Ref
  4. J. W. Byers, M. Luby, M. Mitzenmacher, and A. Rege. 1998. A Digital Fountain Approach to Reliable Distribution of Bulk Data. In Proc. of the ACM SIGCOMM 1998 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication (SIGCOMM ’98), Vancouver, B.C., Canada. ACM, New York, NY, 56–67.Google ScholarGoogle Scholar
  5. Serdar Cabuk, Clara E. Brodley, and Clay Shields. 2009. IP Covert Channel Detection. ACM Transactions on Information and System Security (TISSEC) 12, 4 (April 2009), 22:1–22:29. https://doi.org/10.1145/1513601.1513604Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. R. Coltun, D. Ferguson, J. Moy, and A. Lindem. 2008. RfC-5340: OSPF for IPv6. The Internet Society, Plaza America Drive, Reston, VA. https://www.rfc-editor.org/rfc/rfc5340.txtGoogle ScholarGoogle Scholar
  7. Jingsong Cui, Chi Guo, Manli Zhang, and Qi Guo. 2020. A Method for Realizing Covert Communication at Router Driving Layer. In Trusted Computing and Information Security, Weili Han, Liehuang Zhu, and Fei Yan (Eds.). Springer Singapore, Singapore, 104–118.Google ScholarGoogle Scholar
  8. Thomas W. Edgar and David O. Manz. 2017. Chapter 2 - Science and Cyber Security. In Research Methods for Cyber Security, Thomas W. Edgar and David O. Manz (Eds.). Syngress, Amsterdam, 33–62. https://doi.org/10.1016/B978-0-12-805349-2.00002-9Google ScholarGoogle ScholarCross RefCross Ref
  9. Everyday Finance. 2008. Factors of Production: Land, Labor, Capital. Everyday Finance: Economics, Personal Money Management, and Entrepreneurship. v. 1, p17-20. Bd. 1.Google ScholarGoogle Scholar
  10. W. Fraczek, W. Mazurczyk, and K. Szczypiorski. 2012. Multilevel Steganography: Improving Hidden Communication in Networks. Journal of Universal Computer Science 18, 14 (July 2012), 1967–1986. https://doi.org/10.3217/jucs-018-14-1967Google ScholarGoogle ScholarCross RefCross Ref
  11. Bassam Halabi and Danny McPherson. 2001. Internet routing architectures (2 ed.). Cisco Press, Indianapolis, IN.Google ScholarGoogle Scholar
  12. Jörg Keller and Ewelina Marciniszyn. 2022. Improved Concept and Implementation of a Fountain Code Covert Channel. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA) 13, 3 (2022), 25–36. https://doi.org/10.22667/JOWUA.2022.09.30.025Google ScholarGoogle ScholarCross RefCross Ref
  13. Umer Khan. 2003. In The Best Damn Cisco Internetworking. Syngress, Rockland, Massachusetts. https://doi.org/10.1016/B978-193183691-3/50022-5Google ScholarGoogle ScholarCross RefCross Ref
  14. Mehrdad Khosravi, Maryam Hasanzadeh, and Vahid Khodabakhshi. 2012. A Novel Method for Information Hiding in AODV — The Case of Mobile Ad-hoc Networks. In 9th International ISC Conference on Information Security and Cryptology.Google ScholarGoogle Scholar
  15. Butler W. Lampson. 1973. A note on the confinement problem. Commun. ACM 16, 10 (1973), 613–615. https://doi.org/10.1145/362375.362389Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Wojciech Mazurczyk, Steffen Wendzel, Sebastian Zander, Amir Houmansadr, and Krzysztof Szczypiorski. 2016. Information Hiding in Communication Networks: Fundamentals, Mechanisms, and Applications. Wiley, New York, NY.Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Miralem Mehic, Miroslav Voznák, and Peppino Fazio. 2017. Multicast Steganography Using Routing Protocols. In Multimedia Communications, Services and Security - 9th International Conference, MCSS 2017, Kraków, Poland, November 16-17, 2017, Proceedings(Communications in Computer and Information Science, Vol. 785), Andrzej Dziech and Andrzej Czyzewski (Eds.). Springer, Cham, 124–135. https://doi.org/10.1007/978-3-319-69911-0_10Google ScholarGoogle ScholarCross RefCross Ref
  18. J. Moy. 1998. RfC-2328: OSPF Version 2. The Internet Society, Plaza America Drive, Reston, VA. https://www.rfc-editor.org/rfc/rfc2328.txtGoogle ScholarGoogle Scholar
  19. Adar Ovadya, Rom Ogen, Yakov Mallah, Niv Gilboa, and Yossi Oren. 2019. Cross-Router Covert Channels. In 13th USENIX Workshop on Offensive Technologies, WOOT 2019, Santa Clara, CA, USA, August 12-13, 2019, Alex Gantman and Clémentine Maurice (Eds.). USENIX Association, Washington DC, 12 pages. https://www.usenix.org/conference/woot19/presentation/ovadiaGoogle ScholarGoogle Scholar
  20. Tobias Schmidbauer and Steffen Wendzel. 2022. SoK: A Survey Of Indirect Network-Level Covert Channels. In Proceedings of the 2022 ACM on Asia Conference on Computer and Communications Security (Nagasaki, Japan) (ASIA CCS ’22). Association for Computing Machinery, New York, NY, USA, 546–560. https://doi.org/10.1145/3488932.3517418Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Steffen Schulz, Vijay Varadharajan, and Ahmad-Reza Sadeghi. 2014. The Silence of the LANs: Efficient Leakage Resilience for IPsec VPNs. IEEE Transactions on Information Forensics and Security 9, 2 (2014), 221–232. https://doi.org/10.1109/TIFS.2013.2289978Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Steffen Wendzel, Luca Caviglione, Wojciech Mazurczyk, Aleksandra Mileva, Jana Dittmann, Christian Krätzer, Kevin Lamshöft, Claus Vielhauer, Laura Hartmann, Jörg Keller, and Tom Neubert. 2021. A Revised Taxonomy of Steganography Embedding Patterns. In ARES 2021: The 16th International Conference on Availability, Reliability and Security, Vienna, Austria, August 17-20, 2021. ACM, New York, NY, 67:1–67:12. https://doi.org/10.1145/3465481.3470069Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Steffen Wendzel, Daniela Eller, and Wojciech Mazurczyk. 2018. One Countermeasure, Multiple Patterns: Countermeasure Variation for Covert Channels. In Proceedings of the Central European Cybersecurity Conference 2018, CECC 2018, Ljubljana, Slovenia, November 15-16, 2018. ACM, New York, NY, 1:1–1:6. https://doi.org/10.1145/3277570.3277571Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Steffen Wendzel, Sebastian Zander, Bernhard Fechner, and Christian Herdin. 2015. Pattern-Based Survey and Categorization of Network Covert Channel Techniques. Comput. Surveys 47, 3 (2015), 1–26. https://doi.org/10.1145/2684195Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Network Covert Channels in Routing Protocols

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Other conferences
          ARES '23: Proceedings of the 18th International Conference on Availability, Reliability and Security
          August 2023
          1440 pages
          ISBN:9798400707728
          DOI:10.1145/3600160

          Copyright © 2023 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 29 August 2023

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article
          • Research
          • Refereed limited

          Acceptance Rates

          Overall Acceptance Rate228of451submissions,51%
        • Article Metrics

          • Downloads (Last 12 months)49
          • Downloads (Last 6 weeks)14

          Other Metrics

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        HTML Format

        View this article in HTML Format .

        View HTML Format