Skip to main content

Reporting Insider Threats via Covert Channels

Trusted insiders that betray an organization can inflict substantial harm. In addition to having privileged access to organization resources and information, these users may be familiar with the defenses surrounding valuable assets.

Published onJan 26, 2020
Reporting Insider Threats via Covert Channels
·

Abstract

Trusted insiders that betray an organization can inflict substantial harm. In addition to having privileged access to organization resources and information, these users may be familiar with the defenses surrounding valuable assets. Computers systems at the organization need a mechanism for communicating suspicious activity that is difficult for a malicious insider (or even an outsider) to detect or block. In this work, we propose a covert channel in the Ethernet frame that allows a computer system to report activity inside other, unrelated network communication. The covert channel leverages the differences in the framing approaches used by Ethernet and IP packets to append hidden information to IP packet and transmit it to an organization's administrator. This stealthy communication is difficult for even advanced attackers and is challenging to block since it opportunistically uses unrelated communication. Further, since the transmission is tied to the Ethernet frame, the communication cannot traverse network routers, preventing security information from leaving the organization. We introduce the covert channel, incorporate it into a working prototype, and combine it with an intrusion detection system to show its promise for security event reporting.

Read the full article.

Muchene, D. N., Luli, K., & Shue, C. A. (2013). Reporting Insider Threats via Covert Channels. 2013 IEEE Security and Privacy Workshops. https://doi.org/10.1109/spw.2013.30

*denotes a WPI undergraduate student author

Comments
0
comment

No comments here