Přístupnostní navigace
E-přihláška
Vyhledávání Vyhledat Zavřít
Detail publikace
POLČÁK, L. HRANICKÝ, R. MATOUŠEK, P.
Originální název
Hiding TCP Traffic: Threats and Counter-measures
Typ
článek ve sborníku mimo WoS a Scopus
Jazyk
angličtina
Originální abstrakt
Computer networks were designed to be simple and routers do not validate the integrity of the processed traffic.Consequently, an attacker can modify his or her traffic with the aim of confusing any analyser that intercepts thetraffic, e.g. monitoring and security software or lawful interception. This paper studies the attack that is based onsending additional colliding TCP segments with the same sequential number but different content. The segmentswith the correct message are delivered to the other communicating party of the TCP connection while the fakesegments are dropped en route. The goal of the fake segments is to confuse analysers into decoding a differentmessage to the one that is received by the other communicating party. The other communicating party does notneed to be aware of the attack and therefore does not need any specific software. Although this paper discuss theadvantages and disadvantages of the attack for an attacker, our ultimate goal was to find counter-measuresagainst the attack. Our contribution can be divided into four following parts. 1) We converted the attack to IPv6and searched for possibilities that may force a middle box to drop fake packets. 2) We developed a tool calledLDP, which behaves as a TCP proxy server that masks outbound TCP traffic of a whole network. 3) Weidentified several counter-measures. In addition, we implemented LNC, a tool that identifies the attack in pcapfiles and removes the fake segments. Since LNC is a stand-alone tool, it also deals with traces generated by othersoftware than LDP as long as it is based on the same attack vector. 4) LDP and LNC were tested in bothlaboratory environment and on the Internet. The experiments validated that the attack is applicable for acommunication with a server that is not under the control of an attacker. Several parameters of the attack wereevaluated during the experiments; mainly the number and the length of fake packets and their influence on theperformance of the attack and counter-measures.
Klíčová slova
Law Interception, data hiding, TCP, covert channels.
Autoři
POLČÁK, L.; HRANICKÝ, R.; MATOUŠEK, P.
Rok RIV
2013
Vydáno
22. 5. 2013
Nakladatel
University of Defence in Brno
Místo
Brno
ISBN
978-80-7231-922-0
Kniha
Security and Protection of Information 2013, Proceedings of the Conference
Strany od
83
Strany do
96
Strany počet
14
URL
https://www.fit.vut.cz/research/publication/10333/
BibTex
@inproceedings{BUT103497, author="Libor {Polčák} and Radek {Hranický} and Petr {Matoušek}", title="Hiding TCP Traffic: Threats and Counter-measures", booktitle="Security and Protection of Information 2013, Proceedings of the Conference", year="2013", pages="83--96", publisher="University of Defence in Brno", address="Brno", isbn="978-80-7231-922-0", url="https://www.fit.vut.cz/research/publication/10333/" }
Dokumenty
article.pdf