{"title":"Stealthy Data Exfiltration via TCP Sequence Numbers based Covert Channel","authors":"Jonah Goverman, Ali Tekeoglu","doi":"10.1109/cits52676.2021.9618137","DOIUrl":null,"url":null,"abstract":"Ex-filtration of confidential data from a compromised network node become increasingly difficult given modern day defenses, such as deep packet inspection filters, next generation firewalls, anomaly based behavioral intrusion detection systems, and data loss/leak prevention systems. There are various proposed methods in the literature to establish covert channels for stealthy data extraction, however most of them cause anomalies in the network traffic and could be flagged by the state-of-the art defensive network technologies. In this paper, we describe a novel approach, along with a proof-of-concept implementation, for creating a covert channel that fits well within the bounds of RFC-793, utilizing Transmission Control Protocol (TCP) Sequence Numbers. This method encodes the data to be ex-filtrated within TCP sequence numbers, and adds random bytes as payload to each packet to keep the communication compatible with TCP. By designing the proposed data ex-filtration channel to function within RFC standards, we aimed to increase our ability to blend into the regular network traffic and hide from network monitoring tools. We tested our method against an open source intrusion detection system, Snort, and was able to evade detection.","PeriodicalId":211570,"journal":{"name":"2021 International Conference on Computer, Information and Telecommunication Systems (CITS)","volume":"170 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 International Conference on Computer, Information and Telecommunication Systems (CITS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/cits52676.2021.9618137","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Ex-filtration of confidential data from a compromised network node become increasingly difficult given modern day defenses, such as deep packet inspection filters, next generation firewalls, anomaly based behavioral intrusion detection systems, and data loss/leak prevention systems. There are various proposed methods in the literature to establish covert channels for stealthy data extraction, however most of them cause anomalies in the network traffic and could be flagged by the state-of-the art defensive network technologies. In this paper, we describe a novel approach, along with a proof-of-concept implementation, for creating a covert channel that fits well within the bounds of RFC-793, utilizing Transmission Control Protocol (TCP) Sequence Numbers. This method encodes the data to be ex-filtrated within TCP sequence numbers, and adds random bytes as payload to each packet to keep the communication compatible with TCP. By designing the proposed data ex-filtration channel to function within RFC standards, we aimed to increase our ability to blend into the regular network traffic and hide from network monitoring tools. We tested our method against an open source intrusion detection system, Snort, and was able to evade detection.