Skip to Main Content (Press Enter)

Logo CNR
  • ×
  • Home
  • People
  • Outputs
  • Organizations
  • Expertise & Skills

UNI-FIND
Logo CNR

|

UNI-FIND

cnr.it
  • ×
  • Home
  • People
  • Outputs
  • Organizations
  • Expertise & Skills
  1. Outputs

Are We Protected Against Network Covert Channels?

Conference Poster
Publication Date:
2022
abstract:
Information-hiding-based techniques like covert channels are increasingly used by attackers to conceal malware in different carriers, such as images or inter-process communication services. These techniques allow, for example, to secretly exfiltrate information, elude well-know detection mechanisms, or remotely activate a backdoor. The usage of network traffic features is appealing to attackers, as they offer a wide range of possibilities. The adoption of network covert channel often leads to security problems: in fact, several out-of-the-box Intrusion Detection Systems or firewalls do not consider them as a major threat. Being able to spot covert channels is mandatory to fully assess the security capabilities of a network infrastructure. In this poster, we will answer the question of whether we are really protected from the threat of network covert channels, by assessing the detection capabilities of the most popular and open source security mechanisms, i.e., Snort, Zeek and Suricata.
Iris type:
04.03 Poster in Atti di convegno
Keywords:
Network Covert Channels; Network Security; Intrusion Detection Systems
List of contributors:
Zuppelli, Marco
Authors of the University:
ZUPPELLI MARCO
Handle:
https://iris.cnr.it/handle/20.500.14243/461037
  • Overview

Overview

URL

https://docs-dibris.github.io/assets/theme/posters/Zuppelli.pdf
  • Use of cookies

Powered by VIVO | Designed by Cineca | 26.5.0.0 | Sorgente dati: PREPROD (Ribaltamento disabilitato)