首页> 外文会议>International Conference on Cyber Warfare and Security >Wireless Intrusion Detection of Covert Channel Attacks in ITU-T G.9959-Based Networks
【24h】

Wireless Intrusion Detection of Covert Channel Attacks in ITU-T G.9959-Based Networks

机译:基于ITU-T G.9959的网络中隐蔽信道攻击的无线入侵检测

获取原文

摘要

We introduce herein an information hiding technique for injecting manipulated packets into wireless sensor networks (WSNs). We exhibit how an attacker can apply information hiding as a type of covert channel attack over radio frequency transmissions into the WSN. The feasibility of our injection method is demonstrated through an attack on the most common implementation of the ITU-TG.9959 recommendation, commercially known as Z-Wave. More specifically, we illustrate that after accessing a Z-Wave gateway controller through compromising the WLAN backbone, the attacker has the ability to install malware.The malware scans incoming Z-Wave packets for information hidden in Media Access Control (MAC) frames received by the Z-Wave controller. Upon identification of hidden information, a Reverse Secure Shell is initiated through the WLAN back to the attacker. The outcomes of this attack include control of the Z-Wave network and access to the networked devices on the target WLAN from any Internet connected device. Given this new application of information hiding techniques to Z-Wave networks, we recognize the need for countermeasures. We therefore offer an effective Misusebased Intrusion Detection System (MBIDS) capable of distinguishing between manipulated and correctly formed packets. A Universal Software Radio Peripheral (USRP) Software-Defined Radio (SDR) is used in conjunction with a packet monitoring tool capturing incoming transmissions and inspecting them for any violations of the ITU-T G.9959 MAC specification. We then analytically and experimentally estimate the efficacy of the USRP as a packet capture device in a realistic test setup, and then evaluate the total efficiency of our MBIDS solution. By employing the MBIDS in the Z-Wave network, we show the MBIDS is capable of detecting packet manipulation attacks with 92% mean accuracy.
机译:我们在此介绍一种用于将操纵分组注入无线传感器网络(WSN)的信息隐藏技术。我们展示了攻击者如何将信息作为一种封闭信道攻击应用于WSN的射频传输。通过对ITU-TG.9959建议书的最常见实施方式的攻击来证明我们的注射方法的可行性,以商业称为Z波。更具体地说,我们说明了通过泄压WLAN骨干声音访问Z波网关控制器,攻击者能够安装恶意软件。恶意软件扫描输入z波包以用于隐藏在媒体访问控制(MAC)帧中的信息Z波控制器。在识别隐藏信息时,通过WLAN向攻击者启动反向安全外壳。该攻击的结果包括控制Z波网络,并从任何因特网连接设备访问目标WLAN上的网络设备。鉴于信息隐藏技术对Z波网络的新应用,我们认识到对策的需求。因此,我们提供有效的误用的入侵检测系统(MBID),其能够区分操纵和正确形成的数据包。通用软件无线电外设(USRP)软件定义的无线电(SDR)与分组监视工具结合使用捕获传入传输并检查它们的ITU-T G.9959 MAC规范的任何违规。然后,我们在实际测试设置中分析和实验地估算了USRP作为数据包捕获设备的效果,然后评估了MBIDS解决方案的总效率。通过在z波网络中使用MBID,我们显示MBIDS能够检测92%的均值的分组操纵攻击。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号