Published June 16, 2021 | Version v1
Conference paper Open

Code Augmentation for Detecting Covert Channels Targeting the IPv6 Flow Label

  • 1. IMATI-CNR
  • 2. Warsaw University of Technolog
  • 3. FernUniversität in Hagen

Description

Information hiding is at the basis of a new-wave of malware able to elude common detection mechanisms or remain unnoticed for long periods. To this aim, a key approach exploits network covert channels, i.e., abusive communication paths nested within a legitimate traffic flow. The increasing diffusion of IPv6 makes it attractive for an attacker, especially for the presence of the Flow Label field, which can be manipulated to contain up to 20 secret bits per packet. Unfortunately, gathering data to implement a standalone detection mechanism or to support third-party security tools is a poorly generalizable process and often leads to scalability issues. This paper showcases how to take advantage of code augmentation features (i.e., the extended Berkeley Packet Filter) to detect covert channels targeting the IPv6 Flow Label. To prove its effectiveness, the proposed approach has been tested against Internet-wide traffic traces collected in the wild. Results indicate that it is possible to spot the channel while mitigating the computational burden and the memory footprint.

Files

secsoft2021-3-2-1.pdf

Files (530.6 kB)

Name Size Download all
md5:55a9bfa2c3779963c4aab5c3edb4a8eb
530.6 kB Preview Download

Additional details

Funding

ASTRID – AddreSsing ThReats for virtualIseD services 786922
European Commission
SIMARGL – Secure Intelligent Methods for Advanced RecoGnition of malware and stegomalware 833042
European Commission