Application of Perfectly Undetectable Network Steganography Method for Malware Hidden Communication

Patryk Bąk, Jȩdrzej Bieniasz, M. Krzemiński, K. Szczypiorski
{"title":"Application of Perfectly Undetectable Network Steganography Method for Malware Hidden Communication","authors":"Patryk Bąk, Jȩdrzej Bieniasz, M. Krzemiński, K. Szczypiorski","doi":"10.1109/ICFSP.2018.8552057","DOIUrl":null,"url":null,"abstract":"Currently designed malware utilizes various mechanisms allowing to increase the level of its undetectability through static and dynamic analysis. One of such mechanisms may be hiding in overt network traffic proper communication between the attacker and an active malware application on the infected terminal side. In this paper, a design of such a covert channel of communication is proposed, using a StegBlocks method, which is characterized by a proven feature of perfectly undetectable network steganography. An environment was implemented to test the proof of concept of the designed system of covert transmission. Characteristics and limitations of the method were discussed and directions for development were proposed.","PeriodicalId":355222,"journal":{"name":"2018 4th International Conference on Frontiers of Signal Processing (ICFSP)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"9","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 4th International Conference on Frontiers of Signal Processing (ICFSP)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICFSP.2018.8552057","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 9

Abstract

Currently designed malware utilizes various mechanisms allowing to increase the level of its undetectability through static and dynamic analysis. One of such mechanisms may be hiding in overt network traffic proper communication between the attacker and an active malware application on the infected terminal side. In this paper, a design of such a covert channel of communication is proposed, using a StegBlocks method, which is characterized by a proven feature of perfectly undetectable network steganography. An environment was implemented to test the proof of concept of the designed system of covert transmission. Characteristics and limitations of the method were discussed and directions for development were proposed.
完全不可检测网络隐写法在恶意软件隐藏通信中的应用
目前设计的恶意软件利用各种机制,允许通过静态和动态分析来提高其不可检测性的水平。其中一种机制可能隐藏在公开的网络流量中,即攻击者与受感染终端端的活动恶意软件应用程序之间的适当通信。本文提出了一种使用隐写块(StegBlocks)方法设计这种隐蔽通信信道的方法,该方法的特点是具有完全不可检测的网络隐写特性。实现了一个环境来测试所设计的隐蔽传输系统的概念验证。讨论了该方法的特点和局限性,并提出了今后的发展方向。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信