Synthetic Embedding of Hidden Information in Industrial Control System Network Protocols for Evaluation of Steganographic Malware
For the last several years, the embedding of hidden information by steganographic techniques in network communications is increasingly used by attackers in order to obscure data infiltration, exfiltration or command and control in IT (information technology) and OT (operational technology) systems....
Gespeichert in:
Hauptverfasser: | , , , , |
---|---|
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | |
container_start_page | |
container_title | |
container_volume | |
creator | Neubert, Tom Peuker, Bjarne Buxhoidt, Laura Schueler, Eric Vielhauer, Claus |
description | For the last several years, the embedding of hidden information by
steganographic techniques in network communications is increasingly used by
attackers in order to obscure data infiltration, exfiltration or command and
control in IT (information technology) and OT (operational technology) systems.
Especially industrial control systems (ICS) and critical infrastructures have
increased protection requirements. Currently, network defense mechanisms are
unfortunately quite ineffective against novel attacks based on network
steganography. Thus, on the one hand huge amounts of network data with
steganographic embedding is required to train, evaluate and improve defense
mechanisms. On the other hand, the real-time embedding of hidden information in
productive ICS networks is crucial due to safety violations. Additionally it is
time consuming because it needs special laboratory setup. To address this
challenge, this work introduces an embedding concept to gene ate synthetic
steganographic network data to automatically produce significant amounts of
data for training and evaluation of defense mechanisms. The concept enables the
possibility to manipulate a network packet wherever required and outperforms
the state-of-the-art in terms of embedding pace significantly. |
doi_str_mv | 10.48550/arxiv.2406.19338 |
format | Article |
fullrecord | <record><control><sourceid>arxiv_GOX</sourceid><recordid>TN_cdi_arxiv_primary_2406_19338</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2406_19338</sourcerecordid><originalsourceid>FETCH-LOGICAL-a678-5d050c3b615a23137088d48cfc43aa7ecbb14f10517a76af08dfcc67fc0fa6f03</originalsourceid><addsrcrecordid>eNotkLtOwzAYhbMwoMIDMOEXSLDrJDYjigKtVC5Sukd_fEktHLty3JaMvDlpy3R0hvMd6UuSB4KznBcFfoLwY47ZMsdlRp4p5bfJbzO5uFPRCFQPnZLSuB55jVZGSuXQ2mkfBojGO2TOVR7GGAxYVHkXg7eomcaoBvSh4smHb_QVfPTC2xHNQ1QfwR6u65nZRNWD832A_W7-ewd7gqDukhsNdlT3_7lItq_1tlqlm8-3dfWySaFkPC0kLrCgXUkKWFJCGeZc5lxokVMApkTXkVwTXBAGrASNudRClEwLrKHUmC6Sxyv24qDdBzNAmNqzi_bigv4BXB9dBA</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>Synthetic Embedding of Hidden Information in Industrial Control System Network Protocols for Evaluation of Steganographic Malware</title><source>arXiv.org</source><creator>Neubert, Tom ; Peuker, Bjarne ; Buxhoidt, Laura ; Schueler, Eric ; Vielhauer, Claus</creator><creatorcontrib>Neubert, Tom ; Peuker, Bjarne ; Buxhoidt, Laura ; Schueler, Eric ; Vielhauer, Claus</creatorcontrib><description>For the last several years, the embedding of hidden information by
steganographic techniques in network communications is increasingly used by
attackers in order to obscure data infiltration, exfiltration or command and
control in IT (information technology) and OT (operational technology) systems.
Especially industrial control systems (ICS) and critical infrastructures have
increased protection requirements. Currently, network defense mechanisms are
unfortunately quite ineffective against novel attacks based on network
steganography. Thus, on the one hand huge amounts of network data with
steganographic embedding is required to train, evaluate and improve defense
mechanisms. On the other hand, the real-time embedding of hidden information in
productive ICS networks is crucial due to safety violations. Additionally it is
time consuming because it needs special laboratory setup. To address this
challenge, this work introduces an embedding concept to gene ate synthetic
steganographic network data to automatically produce significant amounts of
data for training and evaluation of defense mechanisms. The concept enables the
possibility to manipulate a network packet wherever required and outperforms
the state-of-the-art in terms of embedding pace significantly.</description><identifier>DOI: 10.48550/arxiv.2406.19338</identifier><language>eng</language><subject>Computer Science - Cryptography and Security</subject><creationdate>2024-06</creationdate><rights>http://creativecommons.org/licenses/by/4.0</rights><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>228,230,780,885</link.rule.ids><linktorsrc>$$Uhttps://arxiv.org/abs/2406.19338$$EView_record_in_Cornell_University$$FView_record_in_$$GCornell_University$$Hfree_for_read</linktorsrc><backlink>$$Uhttps://doi.org/10.48550/arXiv.2406.19338$$DView paper in arXiv$$Hfree_for_read</backlink></links><search><creatorcontrib>Neubert, Tom</creatorcontrib><creatorcontrib>Peuker, Bjarne</creatorcontrib><creatorcontrib>Buxhoidt, Laura</creatorcontrib><creatorcontrib>Schueler, Eric</creatorcontrib><creatorcontrib>Vielhauer, Claus</creatorcontrib><title>Synthetic Embedding of Hidden Information in Industrial Control System Network Protocols for Evaluation of Steganographic Malware</title><description>For the last several years, the embedding of hidden information by
steganographic techniques in network communications is increasingly used by
attackers in order to obscure data infiltration, exfiltration or command and
control in IT (information technology) and OT (operational technology) systems.
Especially industrial control systems (ICS) and critical infrastructures have
increased protection requirements. Currently, network defense mechanisms are
unfortunately quite ineffective against novel attacks based on network
steganography. Thus, on the one hand huge amounts of network data with
steganographic embedding is required to train, evaluate and improve defense
mechanisms. On the other hand, the real-time embedding of hidden information in
productive ICS networks is crucial due to safety violations. Additionally it is
time consuming because it needs special laboratory setup. To address this
challenge, this work introduces an embedding concept to gene ate synthetic
steganographic network data to automatically produce significant amounts of
data for training and evaluation of defense mechanisms. The concept enables the
possibility to manipulate a network packet wherever required and outperforms
the state-of-the-art in terms of embedding pace significantly.</description><subject>Computer Science - Cryptography and Security</subject><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2024</creationdate><recordtype>article</recordtype><sourceid>GOX</sourceid><recordid>eNotkLtOwzAYhbMwoMIDMOEXSLDrJDYjigKtVC5Sukd_fEktHLty3JaMvDlpy3R0hvMd6UuSB4KznBcFfoLwY47ZMsdlRp4p5bfJbzO5uFPRCFQPnZLSuB55jVZGSuXQ2mkfBojGO2TOVR7GGAxYVHkXg7eomcaoBvSh4smHb_QVfPTC2xHNQ1QfwR6u65nZRNWD832A_W7-ewd7gqDukhsNdlT3_7lItq_1tlqlm8-3dfWySaFkPC0kLrCgXUkKWFJCGeZc5lxokVMApkTXkVwTXBAGrASNudRClEwLrKHUmC6Sxyv24qDdBzNAmNqzi_bigv4BXB9dBA</recordid><startdate>20240627</startdate><enddate>20240627</enddate><creator>Neubert, Tom</creator><creator>Peuker, Bjarne</creator><creator>Buxhoidt, Laura</creator><creator>Schueler, Eric</creator><creator>Vielhauer, Claus</creator><scope>AKY</scope><scope>GOX</scope></search><sort><creationdate>20240627</creationdate><title>Synthetic Embedding of Hidden Information in Industrial Control System Network Protocols for Evaluation of Steganographic Malware</title><author>Neubert, Tom ; Peuker, Bjarne ; Buxhoidt, Laura ; Schueler, Eric ; Vielhauer, Claus</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-a678-5d050c3b615a23137088d48cfc43aa7ecbb14f10517a76af08dfcc67fc0fa6f03</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2024</creationdate><topic>Computer Science - Cryptography and Security</topic><toplevel>online_resources</toplevel><creatorcontrib>Neubert, Tom</creatorcontrib><creatorcontrib>Peuker, Bjarne</creatorcontrib><creatorcontrib>Buxhoidt, Laura</creatorcontrib><creatorcontrib>Schueler, Eric</creatorcontrib><creatorcontrib>Vielhauer, Claus</creatorcontrib><collection>arXiv Computer Science</collection><collection>arXiv.org</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Neubert, Tom</au><au>Peuker, Bjarne</au><au>Buxhoidt, Laura</au><au>Schueler, Eric</au><au>Vielhauer, Claus</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Synthetic Embedding of Hidden Information in Industrial Control System Network Protocols for Evaluation of Steganographic Malware</atitle><date>2024-06-27</date><risdate>2024</risdate><abstract>For the last several years, the embedding of hidden information by
steganographic techniques in network communications is increasingly used by
attackers in order to obscure data infiltration, exfiltration or command and
control in IT (information technology) and OT (operational technology) systems.
Especially industrial control systems (ICS) and critical infrastructures have
increased protection requirements. Currently, network defense mechanisms are
unfortunately quite ineffective against novel attacks based on network
steganography. Thus, on the one hand huge amounts of network data with
steganographic embedding is required to train, evaluate and improve defense
mechanisms. On the other hand, the real-time embedding of hidden information in
productive ICS networks is crucial due to safety violations. Additionally it is
time consuming because it needs special laboratory setup. To address this
challenge, this work introduces an embedding concept to gene ate synthetic
steganographic network data to automatically produce significant amounts of
data for training and evaluation of defense mechanisms. The concept enables the
possibility to manipulate a network packet wherever required and outperforms
the state-of-the-art in terms of embedding pace significantly.</abstract><doi>10.48550/arxiv.2406.19338</doi><oa>free_for_read</oa></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | DOI: 10.48550/arxiv.2406.19338 |
ispartof | |
issn | |
language | eng |
recordid | cdi_arxiv_primary_2406_19338 |
source | arXiv.org |
subjects | Computer Science - Cryptography and Security |
title | Synthetic Embedding of Hidden Information in Industrial Control System Network Protocols for Evaluation of Steganographic Malware |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-22T12%3A33%3A07IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-arxiv_GOX&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Synthetic%20Embedding%20of%20Hidden%20Information%20in%20Industrial%20Control%20System%20Network%20Protocols%20for%20Evaluation%20of%20Steganographic%20Malware&rft.au=Neubert,%20Tom&rft.date=2024-06-27&rft_id=info:doi/10.48550/arxiv.2406.19338&rft_dat=%3Carxiv_GOX%3E2406_19338%3C/arxiv_GOX%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |