Hiding TCP Traffic: Nadpis 1 Threats and Countermeasures Nadpis 2 - - PowerPoint PPT Presentation

hiding tcp traffic nadpis 1 threats and countermeasures
SMART_READER_LITE
LIVE PREVIEW

Hiding TCP Traffic: Nadpis 1 Threats and Countermeasures Nadpis 2 - - PowerPoint PPT Presentation

Hiding TCP Traffic: Nadpis 1 Threats and Countermeasures Nadpis 2 Nadpis 3 Libor Polk, Radek Hranick, Petr Matouek Jmno Pjmen Vysok uen technick v Brn, Fakulta informanch technologi v Brn Brno University of


slide-1
SLIDE 1

Nadpis 1 Nadpis 2 Nadpis 3

Jméno Příjmení

Vysoké učení technické v Brně, Fakulta informačních technologií v Brně Božetěchova 2, 612 66 Brno jmeno@fit.vutbr.cz 99.99.2008

Hiding TCP Traffic: Threats and Countermeasures

Libor Polčák, Radek Hranický, Petr Matoušek

Brno University of Technology, Fakulty of information technology Božetěchova 2, 612 66 Brno ipolcak@fit.vutbr.cz xhrani00@stud.fit.vutbr.cz matousp@fit.vutbr.cz 24.5.2013

slide-2
SLIDE 2

Hiding TCP Traffic: Threats and Countermeasures 2

Motivation

  • Detection of traffic hiding in IP networks
  • Completness of lawful interceptions
  • Focus on a specific attack
  • Confusion of packet decoding
  • Misleading information
slide-3
SLIDE 3

Hiding TCP Traffic: Threats and Countermeasures 3

Attack description

slide-4
SLIDE 4

Hiding TCP Traffic: Threats and Countermeasures 4

Normal TCP communication

  • Decoding software
  • Firewall, IDS/IPS
  • Wireshark, TCP session decoding
  • Proprietary e-investigation software
slide-5
SLIDE 5

Hiding TCP Traffic: Threats and Countermeasures 5

Attack description

slide-6
SLIDE 6

Hiding TCP Traffic: Threats and Countermeasures 6

Attack description

  • Main advantage: data hiding without

cooperation of the other side

  • Receiver uses standard TCP without any

modification

slide-7
SLIDE 7

Hiding TCP Traffic: Threats and Countermeasures 7

Attack description

slide-8
SLIDE 8

Hiding TCP Traffic: Threats and Countermeasures 8

Extensions to the attack

slide-9
SLIDE 9

Hiding TCP Traffic: Threats and Countermeasures 9

Cover message in the last segments

slide-10
SLIDE 10

Hiding TCP Traffic: Threats and Countermeasures 10

Configurable-sized segments

slide-11
SLIDE 11

Hiding TCP Traffic: Threats and Countermeasures 11

Datagram drops in IPv6

  • Hop Limit (HL)
  • Middleboxes (e.g. firewalls, IDS/IPS, routers

etc.) may drop some packets

  • Flow label, traffic class
  • Extension headers
  • IPSec (AH, unencrypted ESP)
  • Hop-by-hop headers options
slide-12
SLIDE 12

Hiding TCP Traffic: Threats and Countermeasures 12

LDP – proxy for the attack

  • Source code available at

http://www.fit.vutbr.cz/~ipolcak/prods.php

  • Automatically detects number of hops to the destination
slide-13
SLIDE 13

Hiding TCP Traffic: Threats and Countermeasures 13

Attack analysis

slide-14
SLIDE 14

Hiding TCP Traffic: Threats and Countermeasures 14

Attack analysis – Wireshark/IRC

slide-15
SLIDE 15

Hiding TCP Traffic: Threats and Countermeasures 15

Downside of the attack

  • Information leakage from the opposite

directions of the TCP stream (indirect clue)

  • Incoming IRC messages
  • Preview of the message send to a discussion

forum

  • Consequence: The attack might be misused
  • nly in a specific scenario
  • Opposite direction unavailable to the interceptor
  • No valuable data in the opposite direction
slide-16
SLIDE 16

Hiding TCP Traffic: Threats and Countermeasures 16

Attack characteristic: overhead

  • Very big overhead for short-sized segments
  • Overhead for 16 KB data transfer
  • What can an attacker do?
  • Big segments → easier reconstruction
  • Hide only a specific part of communication
slide-17
SLIDE 17

Hiding TCP Traffic: Threats and Countermeasures 17

Countermeasures and attack detection

slide-18
SLIDE 18

Hiding TCP Traffic: Threats and Countermeasures 18

Attack detection

  • NetFlow
  • Hop Limit variation

Duration Direction Packets Bytes Bpp 3.502 s Attacker -> Server 8467 521056 61 3.502 s Server -> Attacker 1016 79352 78

slide-19
SLIDE 19

Hiding TCP Traffic: Threats and Countermeasures 19

Decoding software

Decoding SW IPv6 support Interpretation Detected anomalies Wireshark Yes First cover message High number of TCP retransmittions Chaosreader Yes Random noise None tcpflow Yes Last cover message None tcptrace Yes Last cover message High number of segments with the same sequential number (rexmt)

… TCP connection 1: … total packets: 3051 … a->b: b->a: total packets: 2565 486 ack pkts sent: 2564 486 … unique bytes sent: 504 8826 … rexmt data pkts: 2037 9 rexmt data bytes: 2037 4759

slide-20
SLIDE 20

Hiding TCP Traffic: Threats and Countermeasures 20

LNC – Fake data removal

  • Filters fake packets in a PCAP file
slide-21
SLIDE 21

Hiding TCP Traffic: Threats and Countermeasures 21

LNC – Fake data removal

slide-22
SLIDE 22

Hiding TCP Traffic: Threats and Countermeasures 22

LNC – Fake data removal

  • Source code available at

http://www.fit.vutbr.cz/~ipolcak/prods.php

slide-23
SLIDE 23

Hiding TCP Traffic: Threats and Countermeasures 23

Fake data removal

  • What can go wrong?
  • Packets are not dropped due to HL/TTL
  • If the destination receives overlapping segments

with distinct content → the behaviour differs

  • Fake packets send when the correct were already

processed

slide-24
SLIDE 24

Hiding TCP Traffic: Threats and Countermeasures 24

Conclusion

slide-25
SLIDE 25

Hiding TCP Traffic: Threats and Countermeasures 25

Conclusion

  • The attack has dozens of modifications
  • Segment length
  • Noise, cover messages
  • Packet dropping
  • Etc.
  • Some forms easy to detect, some harder
  • Suspicious retransimitions
  • Unusual metadata
  • Limited usability due to leakage of data in

the opposite direction

slide-26
SLIDE 26

Hiding TCP Traffic: Threats and Countermeasures 26

Conclusion

  • http://www.fit.vutbr.cz/~ipolcak/prods.php
  • LDP – proxy, LNC – PCAP cleaner
  • Cooperation with Ministry of Interior and Czech police
  • Project Modern Tools for Detection and Mitigation of Cyber

Criminality on the New Generation Internet (http://www.fit.vutbr.cz/~ipolcak/grants.php?id=517)

  • Lawful Interception System
slide-27
SLIDE 27

Hiding TCP Traffic: Threats and Countermeasures 27

Thank you for your attention.