The Community for Technology Leaders
2013 IEEE Security and Privacy Workshops (2013)
San Francisco, CA, USA USA
May 23, 2013 to May 24, 2013
ISBN: 978-1-4799-0458-7
pp: 68-71
Trusted insiders that betray an organization can inflict substantial harm. In addition to having privileged access to organization resources and information, these users may be familiar with the defenses surrounding valuable assets. Computers systems at the organization need a mechanism for communicating suspicious activity that is difficult for a malicious insider (or even an outsider) to detect or block.In this work, we propose a covert channel in the Ethernet frame that allows a computer system to report activity inside other, unrelated network communication. The covert channel leverages the differences in the framing approaches used by Ethernet and IP packets to append hidden information to IP packet and transmit it to an organization's administrator. This stealthy communication is difficult for even advanced attackers and is challenging to block since it opportunistically uses unrelated communication. Further, since the transmission is tied to the Ethernet frame, the communication cannot traverse network routers, preventing security information from leaving the organization.We introduce the covert channel, incorporate it into a working prototype, and combine it with an intrusion detection system to show its promise for security event reporting.
Network Security, Insider Threats, Covert Channels

D. N. Muchene, K. Luli and C. A. Shue, "Reporting Insider Threats via Covert Channels," 2013 IEEE Security and Privacy Workshops(SPW), San Francisco, CA, USA USA, 2013, pp. 68-71.
83 ms
(Ver 3.3 (11022016))