Intelligent Decision Making Systems 2009
DOI: 10.1142/9789814295062_0049
|View full text |Cite
|
Sign up to set email alerts
|

Behavior-Based Covert Channel in Cyberspace

Abstract: Many covert channels take advantages of weaknesses, flaws, or unused data fields in network protocols. In this paper, a behavior-based covert channel, that takes advantages of behavior of an application, is presented along with a formal definition in the framework of finite state machines. The behavior-based covert channel is application specific and lies at the application layer of the network OSI model, which makes the detection of this type of covert channel much more difficult. A detailed sample implementa… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
4
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 11 publications
(13 reference statements)
0
4
0
Order By: Relevance
“…Hernandez-Castro et al devise a game-theoretic framework for hiding data in strategic moves in chess, backgammon and Go [25]. Diehl refines the security notions and computes the data players can exchange undetected in multiplayer games [13] Johnson et al formalized the notion of a behaviorbased covert channel where two or more parties purposefully modify the internal states or behavior of an application to communicate information [33]. Such channels have been proposed using various applications, including anti-virus updates [3], web browsing patterns [70], and video games [33].…”
Section: Prior Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Hernandez-Castro et al devise a game-theoretic framework for hiding data in strategic moves in chess, backgammon and Go [25]. Diehl refines the security notions and computes the data players can exchange undetected in multiplayer games [13] Johnson et al formalized the notion of a behaviorbased covert channel where two or more parties purposefully modify the internal states or behavior of an application to communicate information [33]. Such channels have been proposed using various applications, including anti-virus updates [3], web browsing patterns [70], and video games [33].…”
Section: Prior Workmentioning
confidence: 99%
“…Diehl refines the security notions and computes the data players can exchange undetected in multiplayer games [13] Johnson et al formalized the notion of a behaviorbased covert channel where two or more parties purposefully modify the internal states or behavior of an application to communicate information [33]. Such channels have been proposed using various applications, including anti-virus updates [3], web browsing patterns [70], and video games [33]. Hahn, et al propose Castle, which encodes covert information in player activities within real-time strategy game (such as moving units and constructing buildings) [22].…”
Section: Prior Workmentioning
confidence: 99%
“…can be drawn, however, the most common way is to classify them by type. Three different types have been widely recognized [14]: storage, timing-based, and behaviorbased covert channels.…”
Section: Related Workmentioning
confidence: 99%
“…However, some of them are indirect or informal and require reasoning about potential scenarios in which the conditions might be satisfied (e.g., [30]). Furthermore, those works which do provide some level of formalism, focus primarily on the potential for communication via shared environments through various information flow analyses based on finite state machine models, information theory, and probability theory (e.g., [5,18,26,33]). Perhaps one of the most popular mechanisms for determining the potential for communication for identifying the existence of covert channels is the Shared Resource Matrix technique [20].…”
mentioning
confidence: 99%