36
Using a Novel Blending Method Over Multiple Network Connections for Secure Communications Jaime C. Acosta and John Medrano U.S. Army Research Laboratory

Using a Novel Blending Method Over Multiple Network Connections for Secure Communications Jaime C. Acosta and John Medrano U.S. Army Research Laboratory

Embed Size (px)

Citation preview

Page 1: Using a Novel Blending Method Over Multiple Network Connections for Secure Communications Jaime C. Acosta and John Medrano U.S. Army Research Laboratory

Using a Novel Blending Method Over Multiple Network Connections

for Secure Communications

Jaime C. Acostaand

John Medrano

U.S. Army Research Laboratory

Page 2: Using a Novel Blending Method Over Multiple Network Connections for Secure Communications Jaime C. Acosta and John Medrano U.S. Army Research Laboratory

Motivation

– Network attack steps– Locate a network– Analyze traffic– Identify target– Scan nodes for vulnerabilities– Execute exploit

– Issue– Node addresses and traffic flows

Page 3: Using a Novel Blending Method Over Multiple Network Connections for Secure Communications Jaime C. Acosta and John Medrano U.S. Army Research Laboratory

Motivation

– Covert Communication– Traditionally seen as adversarial– Data exfiltration

– From a defensive perspective– Hide data in decoy traffic– Hide node endpoints– Avoid scanning– Avoid suspicion for critical data

Page 4: Using a Novel Blending Method Over Multiple Network Connections for Secure Communications Jaime C. Acosta and John Medrano U.S. Army Research Laboratory

Covert Communication

– Timing channels

– Timing anomalies

– Generally low throughput

– Data channels

– Unused fields, invalid messages

– Once documented identification is trivial

Page 5: Using a Novel Blending Method Over Multiple Network Connections for Secure Communications Jaime C. Acosta and John Medrano U.S. Army Research Laboratory

Objectives

– Scalable throughput

– Reliable

– Dynamic insertion point selection

Page 6: Using a Novel Blending Method Over Multiple Network Connections for Secure Communications Jaime C. Acosta and John Medrano U.S. Army Research Laboratory

Research Question

Can we leverage characteristics of network flows for covert, secure communication?

Page 7: Using a Novel Blending Method Over Multiple Network Connections for Secure Communications Jaime C. Acosta and John Medrano U.S. Army Research Laboratory

Envisioned Approach

A

FED

CB

Page 8: Using a Novel Blending Method Over Multiple Network Connections for Secure Communications Jaime C. Acosta and John Medrano U.S. Army Research Laboratory

Envisioned Approach

Conn1

Conn2

Conn3Conn4

Conn5

Conn6

Conn7Conn8

A

FED

CB

Connections: 1. Unidirectional 2. Fixed size messages sharing the same

a. source and destination MAC, IP, and portsb. protocol type

3. Have an update rate 4. Have a complexity measure

Page 9: Using a Novel Blending Method Over Multiple Network Connections for Secure Communications Jaime C. Acosta and John Medrano U.S. Army Research Laboratory

Envisioned Approach

Connection Name

Communication Rate

Connection Complexity

Conn1 5 msg/sec Low

Conn2 10 msg/sec Med

Conn3 1 msg/sec High

...

Conn1

Conn2

Conn3Conn4

Conn5

Conn6

Conn7Conn8

Promiscuous Traffic

Covert Communicators

A

FED

CB

Page 10: Using a Novel Blending Method Over Multiple Network Connections for Secure Communications Jaime C. Acosta and John Medrano U.S. Army Research Laboratory

Envisioned Approach

Connection Name

Communication Rate

Connection Complexity

Conn1 5 msg/sec Low

Conn2 10 msg/sec Med

Conn3 1 msg/sec High

...

Conn1

Conn2

Conn3Conn4

Conn5

Conn6

Conn7Conn8

Promiscuous Traffic

Covert Communicators

Hide data within high-complexity payloads

A

FED

CB

Page 11: Using a Novel Blending Method Over Multiple Network Connections for Secure Communications Jaime C. Acosta and John Medrano U.S. Army Research Laboratory

Methodology

– Implement a system – Parameters for determining insertion points

– Evaluate– Vary parameter values– Measure throughput and reliability

Page 12: Using a Novel Blending Method Over Multiple Network Connections for Secure Communications Jaime C. Acosta and John Medrano U.S. Army Research Laboratory

Network Blending Communication System (NBCS)

Network

Analysis Subsystem

Display Subsystem

Communications Subsystem

Configuration

Page 13: Using a Novel Blending Method Over Multiple Network Connections for Secure Communications Jaime C. Acosta and John Medrano U.S. Army Research Laboratory

NBCS Analysis SubsystemNetwork

b0 b1 b2 b3 b4

b0 b1 b2 b3 b4

Connection 1

b0 b1 b2 b3 b4

Packets during window

Connection 2

Connection 3

Page 14: Using a Novel Blending Method Over Multiple Network Connections for Secure Communications Jaime C. Acosta and John Medrano U.S. Army Research Laboratory

NBCS Analysis SubsystemNetwork

b0 b1 b2 b3 b4

b0 b1 b2 b3 b4

Connection 1

b0 b1 b2 b3 b4

Packets during window

Connection 2

Connection 3

Page 15: Using a Novel Blending Method Over Multiple Network Connections for Secure Communications Jaime C. Acosta and John Medrano U.S. Army Research Laboratory

NBCS Analysis Subsystem

Min/Max = byteComplexities

Page 16: Using a Novel Blending Method Over Multiple Network Connections for Secure Communications Jaime C. Acosta and John Medrano U.S. Army Research Laboratory

NBCS Analysis SubsystemNetwork

b0 b1 b2 b3 b4

b0 b1 b2 b3 b4

Connection 1

b0 b1 b2 b3 b4

Packets during window

c0 c1 c2 c3 c4

byteComplexities

sum

Connection 1 complexity

C

Connection 2

Connection 3

Freq.Distribution

Page 17: Using a Novel Blending Method Over Multiple Network Connections for Secure Communications Jaime C. Acosta and John Medrano U.S. Army Research Laboratory

NBCS system

Network

Analysis Subsystem

Display Subsystem

Communications Subsystem

Configuration

Page 18: Using a Novel Blending Method Over Multiple Network Connections for Secure Communications Jaime C. Acosta and John Medrano U.S. Army Research Laboratory

Communications Subsystem

Connection 1 with sufficient complexity

Connection 4 with sufficient complexity

Latest packets with sufficient byteComplexities

Page 19: Using a Novel Blending Method Over Multiple Network Connections for Secure Communications Jaime C. Acosta and John Medrano U.S. Army Research Laboratory

Communications Subsystem

Connection 1 with sufficient complexity

Connection 4 with sufficient complexity

Latest packets with sufficient byteComplexities

Attach Sync and Checksum Bytes

check rateToUse

Page 20: Using a Novel Blending Method Over Multiple Network Connections for Secure Communications Jaime C. Acosta and John Medrano U.S. Army Research Laboratory

Communications Subsystem

Connection 1 with sufficient complexity

Connection 4 with sufficient complexity

Latest packets with sufficient byteComplexities

Page 21: Using a Novel Blending Method Over Multiple Network Connections for Secure Communications Jaime C. Acosta and John Medrano U.S. Army Research Laboratory

NBCS System

Network

Analysis Subsystem

Display Subsystem

Communications Subsystem

Configuration

Page 22: Using a Novel Blending Method Over Multiple Network Connections for Secure Communications Jaime C. Acosta and John Medrano U.S. Army Research Laboratory

Display Subsystem

Page 23: Using a Novel Blending Method Over Multiple Network Connections for Secure Communications Jaime C. Acosta and John Medrano U.S. Army Research Laboratory

Requirements – How it can be done

– Hub– Promiscuous by default

– Switch – Port mirroring

– Wireless– Within distance

– Multicast– Within group

Page 24: Using a Novel Blending Method Over Multiple Network Connections for Secure Communications Jaime C. Acosta and John Medrano U.S. Army Research Laboratory

Requirements – How it can be done

– Hub– Promiscuous by default

– Switch – Port mirroring

– Wireless– Within distance

– Multicast– Within group

Page 25: Using a Novel Blending Method Over Multiple Network Connections for Secure Communications Jaime C. Acosta and John Medrano U.S. Army Research Laboratory

Evaluation - Network Setup

Load A Load BOvert Nodes 6 12Packets/sec 80-100 5200-5500Bytes/sec 95KB – 115KB 2.7MB – 3.5MB# of Connections 15-20 (6 UDP) 40-50 (6 UDP)

Page 26: Using a Novel Blending Method Over Multiple Network Connections for Secure Communications Jaime C. Acosta and John Medrano U.S. Army Research Laboratory

Evaluation

– Controlled (favoring low detectability)

– Window Size = 1000ms

– Sync Bytes = 2

– Checksum Bytes = 2

– Protocol to Use = UDP

– Rate Threshold = 10

– Rate to Use = 0.1

Page 27: Using a Novel Blending Method Over Multiple Network Connections for Secure Communications Jaime C. Acosta and John Medrano U.S. Army Research Laboratory

Evaluation

– Independent– Byte Complexity Threshold [0.1-0.9]

– Dependent– Throughput– Packet loss

– Procedure– Covert sender and receiver start

simultaneously– Covert data buffer is always full– Run for 5 minutes

Page 28: Using a Novel Blending Method Over Multiple Network Connections for Secure Communications Jaime C. Acosta and John Medrano U.S. Army Research Laboratory

Results - Throughput

Page 29: Using a Novel Blending Method Over Multiple Network Connections for Secure Communications Jaime C. Acosta and John Medrano U.S. Army Research Laboratory

Results – Packet Loss

Page 30: Using a Novel Blending Method Over Multiple Network Connections for Secure Communications Jaime C. Acosta and John Medrano U.S. Army Research Laboratory

Future Work

– More beneficial to hide covert data based on byte similarity?

– Wireless and multicast traffic?

– Automatic parameter tuning in real time depending on network characteristics?

Page 31: Using a Novel Blending Method Over Multiple Network Connections for Secure Communications Jaime C. Acosta and John Medrano U.S. Army Research Laboratory

Questions

Page 32: Using a Novel Blending Method Over Multiple Network Connections for Secure Communications Jaime C. Acosta and John Medrano U.S. Army Research Laboratory

Preliminary Wireless Tests

Page 33: Using a Novel Blending Method Over Multiple Network Connections for Secure Communications Jaime C. Acosta and John Medrano U.S. Army Research Laboratory

Preliminary Wireless Tests

Page 34: Using a Novel Blending Method Over Multiple Network Connections for Secure Communications Jaime C. Acosta and John Medrano U.S. Army Research Laboratory

NBCS Analysis SubsystemNetwork

b0 b1 b2 b3 b4

b0 b1 b2 b3 b4

Connection 1

b0 b1 b2 b3 b4

Packets during window

Connection 2

Connection 3

Page 35: Using a Novel Blending Method Over Multiple Network Connections for Secure Communications Jaime C. Acosta and John Medrano U.S. Army Research Laboratory

NBCS Analysis Subsystem

Sample byte complexities

Page 36: Using a Novel Blending Method Over Multiple Network Connections for Secure Communications Jaime C. Acosta and John Medrano U.S. Army Research Laboratory

NBCS Analysis SubsystemNetwork

b0 b1 b2 b3 b4

b0 b1 b2 b3 b4

Connection 1

b0 b1 b2 b3 b4

Packets during window

c0 c1 c2 c3 c4

byteComplexities

sum

Connection 1 complexity

C

Connection 2

Connection 3

Min Max