Application of Perfectly Undetectable Network Steganography Method for Malware Hidden Communication
Patryk Bąk , Jędrzej Bieniasz , Michał Krzemiński , Krzysztof Szczypiorski
AbstractCurrently designed malware utilizes various mechanisms allowing to increase the level of its undetectability through static and dynamic analysis. One of such mechanisms may be hiding in overt network traffic proper communication between the attacker and an active malware application on the infected terminal side. In this paper, a design of such a covert channel of communication is proposed, using a StegBlocks method, which is characterized by a proven feature of perfectly undetectable network steganography. An environment was implemented to test the proof of concept of the designed system of covert transmission. Characteristics and limitations of the method were discussed and directions for development were proposed.
|Total number of authors||7|
|Publication size in sheets||0.5|
|Book||Jacques Blanc-Talon, Szczypiorski Krzysztof (eds.): Proceedings of the 4th International Conference on Frontiers of Signal Processing - ICFSP 2018, 2018, IEEEXplore, ISBN 978-1-5386-7852-7, 175 p.|
|Keywords in English||malware, information hiding, StegBlocks, covert channels|
|Score|| = 0.0, BookChapterMatConf|
= 0.0, BookChapterMatConf
* presented citation count is obtained through Internet information analysis and it is close to the number calculated by the Publish or Perish system.