Hidden in plain sight. sdp-based covert channel for botnet communication
Z Tsiatsikas, M Anagnostopoulos… - Trust, Privacy and …, 2015 - Springer
Trust, Privacy and Security in Digital Business: 12th International Conference …, 2015•Springer
Covert channels pose a significant threat for networking systems. In this paper, we examine
the exploitation of Session Description Protocol (SDP) information residing in Session
Initiation Protocol (SIP) requests with the aim to hide data in plain sight. While a significant
mass of works in the literature cope with covert communication channels, only a very limited
number of them rely on SIP to realize its goals. Also, none of them concentrates on SDP data
contained in SIP messages to implement and evaluate such a hidden communication …
the exploitation of Session Description Protocol (SDP) information residing in Session
Initiation Protocol (SIP) requests with the aim to hide data in plain sight. While a significant
mass of works in the literature cope with covert communication channels, only a very limited
number of them rely on SIP to realize its goals. Also, none of them concentrates on SDP data
contained in SIP messages to implement and evaluate such a hidden communication …
Abstract
Covert channels pose a significant threat for networking systems. In this paper, we examine the exploitation of Session Description Protocol (SDP) information residing in Session Initiation Protocol (SIP) requests with the aim to hide data in plain sight. While a significant mass of works in the literature cope with covert communication channels, only a very limited number of them rely on SIP to realize its goals. Also, none of them concentrates on SDP data contained in SIP messages to implement and evaluate such a hidden communication channel. Motivated by this fact, the work at hand proposes and demonstrates the feasibility of a simple but very effective in terms of stealthiness and simplicity SIP-based covert channel for botnet Command and Control (C&C). As a side contribution, we assess the soundness and the impact of such a deployment at the victim’s side via the use of two different types of flooding attacks.
Springer
以上显示的是最相近的搜索结果。 查看全部搜索结果