Proceedings of the 16th International Conference on Availability, Reliability and Security 2021
DOI: 10.1145/3465481.3470028
|View full text |Cite
|
Sign up to set email alerts
|

bccstego: A Framework for Investigating Network Covert Channels

Abstract: Modern malware increasingly exploits information hiding to remain undetected while attacking. To this aim, network covert channels, i.e., hidden communication paths established within legitimate flows, can be used to exfiltrate data or exchange commands without getting noticed by firewalls, antivirus, and intrusion detection systems. Since the secret data can be directly injected in various portions of the stream or encoded via suitable alterations of the traffic, spotting hidden communications is a challengin… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
7
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
4
3

Relationship

1
6

Authors

Journals

citations
Cited by 12 publications
(7 citation statements)
references
References 20 publications
0
7
0
Order By: Relevance
“…• Inspection Layer: it contains a set of eBPF programs that can create statistics on the usage of header fields and packet inter-arrival times for both IPv4/v6 traffic. Programs 3 collecting data to address storage channels are based on a modified version of bccstego, i.e., a suite of tools able to generate filters for inspecting network and higher-level protocols like TCP/UDP [22]. Instead, to address timing channels, we created a novel eBPF program 4 collecting time information and implementing the approach presented in [12] within the kernel; • Management Layer: to load and unload eBPF programs as well as to collect measures, we implemented ad-hoc scripts and user-land utilities taking advantage of the BPF Compiler Collection (BCC) library 5 .…”
Section: Methodsmentioning
confidence: 99%
“…• Inspection Layer: it contains a set of eBPF programs that can create statistics on the usage of header fields and packet inter-arrival times for both IPv4/v6 traffic. Programs 3 collecting data to address storage channels are based on a modified version of bccstego, i.e., a suite of tools able to generate filters for inspecting network and higher-level protocols like TCP/UDP [22]. Instead, to address timing channels, we created a novel eBPF program 4 collecting time information and implementing the approach presented in [12] within the kernel; • Management Layer: to load and unload eBPF programs as well as to collect measures, we implemented ad-hoc scripts and user-land utilities taking advantage of the BPF Compiler Collection (BCC) library 5 .…”
Section: Methodsmentioning
confidence: 99%
“…Luca et al [13] presented the use of code augmentation in eBPF inside the Linux kernel to collect the statistics of IPv6 header fields like Flow Label. Repetto et al [14] used the BCC tool for running eBPF programs to obtain statistics about IPv6 header fields viz. the Flow Label field, the Traffic Class field, and the Hop Limit field.…”
Section: Literature Reviewmentioning
confidence: 99%
“…the Flow Label field, the Traffic Class field, and the Hop Limit field. The underlying concept in both [13] and [14] was to share a common technique for analyzing packets' headers and gathering data for hidden data analysis. The authors inferred that abnormal changes in the statistical values of these header fields can raise an alarm about the existence of a covert channel.…”
Section: Literature Reviewmentioning
confidence: 99%
See 2 more Smart Citations