Patryk Bąk, Jȩdrzej Bieniasz, M. Krzemiński, K. Szczypiorski
{"title":"完全不可检测网络隐写法在恶意软件隐藏通信中的应用","authors":"Patryk Bąk, Jȩdrzej Bieniasz, M. Krzemiński, K. Szczypiorski","doi":"10.1109/ICFSP.2018.8552057","DOIUrl":null,"url":null,"abstract":"Currently designed malware utilizes various mechanisms allowing to increase the level of its undetectability through static and dynamic analysis. One of such mechanisms may be hiding in overt network traffic proper communication between the attacker and an active malware application on the infected terminal side. In this paper, a design of such a covert channel of communication is proposed, using a StegBlocks method, which is characterized by a proven feature of perfectly undetectable network steganography. An environment was implemented to test the proof of concept of the designed system of covert transmission. Characteristics and limitations of the method were discussed and directions for development were proposed.","PeriodicalId":355222,"journal":{"name":"2018 4th International Conference on Frontiers of Signal Processing (ICFSP)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"9","resultStr":"{\"title\":\"Application of Perfectly Undetectable Network Steganography Method for Malware Hidden Communication\",\"authors\":\"Patryk Bąk, Jȩdrzej Bieniasz, M. Krzemiński, K. Szczypiorski\",\"doi\":\"10.1109/ICFSP.2018.8552057\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Currently designed malware utilizes various mechanisms allowing to increase the level of its undetectability through static and dynamic analysis. One of such mechanisms may be hiding in overt network traffic proper communication between the attacker and an active malware application on the infected terminal side. In this paper, a design of such a covert channel of communication is proposed, using a StegBlocks method, which is characterized by a proven feature of perfectly undetectable network steganography. An environment was implemented to test the proof of concept of the designed system of covert transmission. Characteristics and limitations of the method were discussed and directions for development were proposed.\",\"PeriodicalId\":355222,\"journal\":{\"name\":\"2018 4th International Conference on Frontiers of Signal Processing (ICFSP)\",\"volume\":\"18 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-09-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"9\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2018 4th International Conference on Frontiers of Signal Processing (ICFSP)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICFSP.2018.8552057\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 4th International Conference on Frontiers of Signal Processing (ICFSP)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICFSP.2018.8552057","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Application of Perfectly Undetectable Network Steganography Method for Malware Hidden Communication
Currently designed malware utilizes various mechanisms allowing to increase the level of its undetectability through static and dynamic analysis. One of such mechanisms may be hiding in overt network traffic proper communication between the attacker and an active malware application on the infected terminal side. In this paper, a design of such a covert channel of communication is proposed, using a StegBlocks method, which is characterized by a proven feature of perfectly undetectable network steganography. An environment was implemented to test the proof of concept of the designed system of covert transmission. Characteristics and limitations of the method were discussed and directions for development were proposed.