Towards Steganography Detection Through Network Traffic Visualisation

Towards Steganography Detection Through Network Traffic Visualisation

Towards Steganography Detection Through Network Traffic Visualisation Wojciech Mazurczyk, Krzysztof Szczypiorski, Bartosz Jankowski Institute of Telecommunications Warsaw University of Technology Warsaw, Poland e-mail: {wmazurczyk, ksz}@tele.pw.edu.pl, [email protected] Abstract — The paper presents initial step toward new network anomalies include worms, viruses or trojans. However, anomaly detection method that is based on traffic visualisation. another new threat is currently seen as a rising threat to The key design principle of the proposed approach is the lack network security: network steganography ([3], [4]). Such of direct, linear time dependencies for the created network methods may be easily utilised as a tool for data exfiltration traffic visualisations. The method’s feasibility is demonstrated or to enable network attacks. Detection of network in network steganography environment by presenting steg- steganography is still in its infancy and does not have tomography methodology and developing the dedicated satisfactory methods/devices. visualisation tool. To authors’ best knowledge this is the first The main aim of network steganography is to hide secret utilization of network traffic visualisations for steganalysis data “inside” the carrier i.e. normal transmissions of users. In purposes. an ideal situation hidden data exchange cannot be detected Keywords: steganalysis, steganography detection, traffic by third parties unaware of the steganography usage. The visualisation best carrier for secret messages must have two features. Firstly, it should be popular i.e. usage of such carrier should not be considered as an anomaly itself. The more instances I. INTRODUCTION of such carriers (steganographically unmodified) are present Anomalies in network traffic can be caused by malicious and utilized in network the better, because they mask using actions that might compromise network security. Thus, particular carrier to perform hidden communication. anomaly detection methods in telecommunication networks Secondly, modification of the carrier related to inserting the focus on finding illegal activities/events, especially those that steganogram should not be “visible” to the third party not can be caused by potential attacker/intruder. The device that aware of the steganographic procedure. Contrary to typical offers such functionality is called Intrusion steganographic methods which utilize digital media Detection/Prevention System (ID/PS) that is a vital network (pictures, audio and video files) as a cover for hidden data security component allowing the implementation of the (steganogram), network steganography utilizes assumed security policy. However, currently such solutions communication protocols’ control elements and their basic for the telecommunication networks are facing problems intrinsic functionality. As a result, such methods are harder caused mostly by huge traffic volume that must be to detect and eliminate. monitored: they are not efficient enough. And in ideal In the last decade one can observe very intensive research situation traffic analysis should be performed in a near real- effort related to steganography and its detection methods and time manner to prevent potential attacks as soon as possible. to network steganography in particular. This has been caused This urges to work on effective and efficient solutions for by two facts: first, industry and business interest in DRM network anomaly detection. (Digital Rights Management) and second alleged utilisation Anomalies are defined as patterns that do not conform to of the steganographic methods by terrorist while planning defined and expected established principle. The essence of attack on USA on September 11 th , 2001 [6]. Incoming years the anomaly detection is a problem of finding data patters proved that it was not an isolated case: in 2010 it was that do not fit the defined set of the expected behaviour. reported that the uncovered Russian spy ring used digital Anomaly detection methods have wide spectrum of picture steganography to leak classified information from applications ([1], [2]) from detection of credit card frauds, USA to Moscow [7]. software/hardware malfunctions, military applications to In order to minimize the potential threat to public detection of the malicious activities in telecommunication security, identification of such methods is important as is the networks. development of effective detection (steganalysis) methods. Anomaly detection in telecommunication networks As mentioned above, up till now no universal, widely focuses on finding illegal activities/events, especially those deployed detection methods exist that are efficiently able to that can be caused by potential attacker/intruder. Illegal fight network steganography usage. Therefore, it is important activity includes: DoS (Denial of Service) or DDoS to include in the detection methods development the ability (Distributed DoS) attacks, network devices port scanning to uncover steganographic communication as well. attempts or hacking of the security measures, hostile devices That is why, in this paper we make an initial step towards takeovers or other events that can be harmful for security more general steganalysis method based on network traffic policy defined for a given network. Other sources of visualisation that we named steg-tomography . The approach are, generally, unable to achieve this goal, because they are is demonstrated on example of LACK (Lost Audio Packets facing the following problems related to: Steganography) steganographic method that is one of the • Huge traffic volume that should be monitored – many state of the art steganographic method for VoIP (Voice over IDS/IPS systems are just not efficient enough to process IP) and was introduced in 2008 [26]. This solution takes it in near real-time manner. advantage of the fact that in typical multimedia • The difference between normal/expected and communication protocols, excessively delayed packets are anomalous behaviour that can be sometimes hard to not used for the reconstruction of transmitted data at the define. For example, network steganography methods receiver; that is, the packets are considered useless and intentionally imitate users’ network traffic behaviour in discarded. Thus, for some of the chosen voice packets order to hide their existence, thus it can be qualified as a intentional delay is introduced and their payload is normal behaviour. On the other hand real user’s traffic substituted with secret data. can be classified as anomaly in certain circumstances (e.g. implementation of the new protocol or service that The rest of the paper is structured as follows. Section 2 was not encountered before by ID/PS). describes background and related work in anomaly detection, • Potential adaptability of the attacker behaviour in steganalysis and network traffic visualisation for security order to omit disclosure. purposes. Section 3 describes experimental methodology: • Nature of the telecommunication networks and their details of the proposed steganalysis approach, chosen services – normal/expected behaviour can change in steganographic method and developed testbed. Section 4 time. Thus, expected behaviour in a given time moment presents and discusses obtained experimental results. Finally, does not guarantee successful anomaly detection in the Section 5 summarizes our efforts. future. • Existence of the certain behaviours that are caused by II. RELATED WORK users without negative intentions . Such behaviours Anomaly detection can be classified, based on (e.g. caused by device malfunction) cannot be treated as availability of the training data that is used to "teach" expected/normal behaviour but can make detection of the detection methods of what the anomalies are (both for real network anomalies harder. normal as well as anomaly class), as [1]: • Supervised Anomaly Detection (examples: [12], [13]) – Moreover, it must be emphasised, that although ID/PSs where there is availability of a training data set (both are usually including detection of various kinds of anomalies normal and anomalous). Based on this data proper – mainly network attacks, they are not able in their current models are derived. Next, unseen, inspected data is form to prevent network steganography utilisation. classified based on comparison with these models. Network steganography detection methods were • Semi-supervised Anomaly Detection (examples: [14], somewhat developed independently from ID/PS systems. [15]) – where the training data has instances for only the Most steganalysis methods focus on trying to detect the normal class (which is more desirable). That is why these presence of hidden communication and then on limiting its methods are more widely applicable than supervised transmission capabilities, because as stated in [5] and [19] techniques. elimination of all network steganography opportunities is • Unsupervised Anomaly Detection – where training data practically impossible. Currently, most steganalysis methods is not required (which is most desirable), thus such can be characterised by high computational complexity and methods are most widely applicable. These methods are time consuming, which in practise limits their make the implicit assumption that normal behaviour is far applicability for real-network traffic. Steganography more frequent than anomalies and utilises this rule to detection methods can be divided into [20]: detect such defined anomalies. • Statistical steganalysis – examples of

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    8 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us