16,769 research outputs found

    Measure of covertness based on the imperfect synchronization of an eavesdropper in Random Communication Systems

    Get PDF
    10th International Conference on Electrical and Electronics Engineering, ELECO 2017; Bursa; Turkey; 29 November 2017 through 2 December 2017Random Communication Systems (RCSs) given in the literature have assumed perfectly synchronized transmitter and receiver. However in this paper, instead of assuming perfect synchronization approach in RCSs, the effects of imperfect synchronization (IS) on Skewed Alpha-Stable Noise Shift Keying (SkaS-NSK) based RCS have been observed through simulations. The Bit Error Rate (BER) performance of the eavesdropper with respect to his synchronization error in SkaS-NSK based RCS, has been analyzed. An expression for the probability of an eavesdropper to decode the binary information (i.e., Eavesdropping Probability) in SkaS-NSK based RCS, has been derived. The criterion (i.e., Covertness Value) to measure the covertness level of RCSs has also been proposed. The BER performance of an eavesdropper provides an approximate margin of synchronization error if it can be overcome by an eavesdropper then he can achieve the decoding (i.e., eavesdropping) process

    DNA Steganalysis Using Deep Recurrent Neural Networks

    Full text link
    Recent advances in next-generation sequencing technologies have facilitated the use of deoxyribonucleic acid (DNA) as a novel covert channels in steganography. There are various methods that exist in other domains to detect hidden messages in conventional covert channels. However, they have not been applied to DNA steganography. The current most common detection approaches, namely frequency analysis-based methods, often overlook important signals when directly applied to DNA steganography because those methods depend on the distribution of the number of sequence characters. To address this limitation, we propose a general sequence learning-based DNA steganalysis framework. The proposed approach learns the intrinsic distribution of coding and non-coding sequences and detects hidden messages by exploiting distribution variations after hiding these messages. Using deep recurrent neural networks (RNNs), our framework identifies the distribution variations by using the classification score to predict whether a sequence is to be a coding or non-coding sequence. We compare our proposed method to various existing methods and biological sequence analysis methods implemented on top of our framework. According to our experimental results, our approach delivers a robust detection performance compared to other tools

    Command & Control: Understanding, Denying and Detecting - A review of malware C2 techniques, detection and defences

    Full text link
    In this survey, we first briefly review the current state of cyber attacks, highlighting significant recent changes in how and why such attacks are performed. We then investigate the mechanics of malware command and control (C2) establishment: we provide a comprehensive review of the techniques used by attackers to set up such a channel and to hide its presence from the attacked parties and the security tools they use. We then switch to the defensive side of the problem, and review approaches that have been proposed for the detection and disruption of C2 channels. We also map such techniques to widely-adopted security controls, emphasizing gaps or limitations (and success stories) in current best practices.Comment: Work commissioned by CPNI, available at c2report.org. 38 pages. Listing abstract compressed from version appearing in repor

    Covert Channels Within IRC

    Get PDF
    The exploration of advanced information hiding techniques is important to understand and defend against illicit data extractions over networks. Many techniques have been developed to covertly transmit data over networks, each differing in their capabilities, methods, and levels of complexity. This research introduces a new class of information hiding techniques for use over Internet Relay Chat (IRC), called the Variable Advanced Network IRC Stealth Handler (VANISH) system. Three methods for concealing information are developed under this framework to suit the needs of an attacker. These methods are referred to as the Throughput, Stealth, and Baseline scenarios. Each is designed for a specific purpose: to maximize channel capacity, minimize shape-based detectability, or provide a baseline for comparison using established techniques applied to IRC. The effectiveness of these scenarios is empirically tested using public IRC servers in Chicago, Illinois and Amsterdam, Netherlands. The Throughput method exfiltrates covert data at nearly 800 bits per second (bps) compared to 18 bps with the Baseline method and 0.13 bps for the Stealth method. The Stealth method uses Reed-Solomon forward error correction to reduce bit errors from 3.1% to nearly 0% with minimal additional overhead. The Stealth method also successfully evades shape-based detection tests but is vulnerable to regularity-based tests
    corecore