Synthetic Embedding of Hidden Information in Industrial Control System Network Protocols for Evaluation of Steganographic Malware

For the last several years, the embedding of hidden information by steganographic techniques in network communications is increasingly used by attackers in order to obscure data infiltration, exfiltration or command and control in IT (information technology) and OT (operational technology) systems....

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Neubert, Tom, Peuker, Bjarne, Buxhoidt, Laura, Schueler, Eric, Vielhauer, Claus
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator Neubert, Tom
Peuker, Bjarne
Buxhoidt, Laura
Schueler, Eric
Vielhauer, Claus
description For the last several years, the embedding of hidden information by steganographic techniques in network communications is increasingly used by attackers in order to obscure data infiltration, exfiltration or command and control in IT (information technology) and OT (operational technology) systems. Especially industrial control systems (ICS) and critical infrastructures have increased protection requirements. Currently, network defense mechanisms are unfortunately quite ineffective against novel attacks based on network steganography. Thus, on the one hand huge amounts of network data with steganographic embedding is required to train, evaluate and improve defense mechanisms. On the other hand, the real-time embedding of hidden information in productive ICS networks is crucial due to safety violations. Additionally it is time consuming because it needs special laboratory setup. To address this challenge, this work introduces an embedding concept to gene ate synthetic steganographic network data to automatically produce significant amounts of data for training and evaluation of defense mechanisms. The concept enables the possibility to manipulate a network packet wherever required and outperforms the state-of-the-art in terms of embedding pace significantly.
doi_str_mv 10.48550/arxiv.2406.19338
format Article
fullrecord <record><control><sourceid>arxiv_GOX</sourceid><recordid>TN_cdi_arxiv_primary_2406_19338</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2406_19338</sourcerecordid><originalsourceid>FETCH-LOGICAL-a678-5d050c3b615a23137088d48cfc43aa7ecbb14f10517a76af08dfcc67fc0fa6f03</originalsourceid><addsrcrecordid>eNotkLtOwzAYhbMwoMIDMOEXSLDrJDYjigKtVC5Sukd_fEktHLty3JaMvDlpy3R0hvMd6UuSB4KznBcFfoLwY47ZMsdlRp4p5bfJbzO5uFPRCFQPnZLSuB55jVZGSuXQ2mkfBojGO2TOVR7GGAxYVHkXg7eomcaoBvSh4smHb_QVfPTC2xHNQ1QfwR6u65nZRNWD832A_W7-ewd7gqDukhsNdlT3_7lItq_1tlqlm8-3dfWySaFkPC0kLrCgXUkKWFJCGeZc5lxokVMApkTXkVwTXBAGrASNudRClEwLrKHUmC6Sxyv24qDdBzNAmNqzi_bigv4BXB9dBA</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>Synthetic Embedding of Hidden Information in Industrial Control System Network Protocols for Evaluation of Steganographic Malware</title><source>arXiv.org</source><creator>Neubert, Tom ; Peuker, Bjarne ; Buxhoidt, Laura ; Schueler, Eric ; Vielhauer, Claus</creator><creatorcontrib>Neubert, Tom ; Peuker, Bjarne ; Buxhoidt, Laura ; Schueler, Eric ; Vielhauer, Claus</creatorcontrib><description>For the last several years, the embedding of hidden information by steganographic techniques in network communications is increasingly used by attackers in order to obscure data infiltration, exfiltration or command and control in IT (information technology) and OT (operational technology) systems. Especially industrial control systems (ICS) and critical infrastructures have increased protection requirements. Currently, network defense mechanisms are unfortunately quite ineffective against novel attacks based on network steganography. Thus, on the one hand huge amounts of network data with steganographic embedding is required to train, evaluate and improve defense mechanisms. On the other hand, the real-time embedding of hidden information in productive ICS networks is crucial due to safety violations. Additionally it is time consuming because it needs special laboratory setup. To address this challenge, this work introduces an embedding concept to gene ate synthetic steganographic network data to automatically produce significant amounts of data for training and evaluation of defense mechanisms. The concept enables the possibility to manipulate a network packet wherever required and outperforms the state-of-the-art in terms of embedding pace significantly.</description><identifier>DOI: 10.48550/arxiv.2406.19338</identifier><language>eng</language><subject>Computer Science - Cryptography and Security</subject><creationdate>2024-06</creationdate><rights>http://creativecommons.org/licenses/by/4.0</rights><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>228,230,780,885</link.rule.ids><linktorsrc>$$Uhttps://arxiv.org/abs/2406.19338$$EView_record_in_Cornell_University$$FView_record_in_$$GCornell_University$$Hfree_for_read</linktorsrc><backlink>$$Uhttps://doi.org/10.48550/arXiv.2406.19338$$DView paper in arXiv$$Hfree_for_read</backlink></links><search><creatorcontrib>Neubert, Tom</creatorcontrib><creatorcontrib>Peuker, Bjarne</creatorcontrib><creatorcontrib>Buxhoidt, Laura</creatorcontrib><creatorcontrib>Schueler, Eric</creatorcontrib><creatorcontrib>Vielhauer, Claus</creatorcontrib><title>Synthetic Embedding of Hidden Information in Industrial Control System Network Protocols for Evaluation of Steganographic Malware</title><description>For the last several years, the embedding of hidden information by steganographic techniques in network communications is increasingly used by attackers in order to obscure data infiltration, exfiltration or command and control in IT (information technology) and OT (operational technology) systems. Especially industrial control systems (ICS) and critical infrastructures have increased protection requirements. Currently, network defense mechanisms are unfortunately quite ineffective against novel attacks based on network steganography. Thus, on the one hand huge amounts of network data with steganographic embedding is required to train, evaluate and improve defense mechanisms. On the other hand, the real-time embedding of hidden information in productive ICS networks is crucial due to safety violations. Additionally it is time consuming because it needs special laboratory setup. To address this challenge, this work introduces an embedding concept to gene ate synthetic steganographic network data to automatically produce significant amounts of data for training and evaluation of defense mechanisms. The concept enables the possibility to manipulate a network packet wherever required and outperforms the state-of-the-art in terms of embedding pace significantly.</description><subject>Computer Science - Cryptography and Security</subject><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2024</creationdate><recordtype>article</recordtype><sourceid>GOX</sourceid><recordid>eNotkLtOwzAYhbMwoMIDMOEXSLDrJDYjigKtVC5Sukd_fEktHLty3JaMvDlpy3R0hvMd6UuSB4KznBcFfoLwY47ZMsdlRp4p5bfJbzO5uFPRCFQPnZLSuB55jVZGSuXQ2mkfBojGO2TOVR7GGAxYVHkXg7eomcaoBvSh4smHb_QVfPTC2xHNQ1QfwR6u65nZRNWD832A_W7-ewd7gqDukhsNdlT3_7lItq_1tlqlm8-3dfWySaFkPC0kLrCgXUkKWFJCGeZc5lxokVMApkTXkVwTXBAGrASNudRClEwLrKHUmC6Sxyv24qDdBzNAmNqzi_bigv4BXB9dBA</recordid><startdate>20240627</startdate><enddate>20240627</enddate><creator>Neubert, Tom</creator><creator>Peuker, Bjarne</creator><creator>Buxhoidt, Laura</creator><creator>Schueler, Eric</creator><creator>Vielhauer, Claus</creator><scope>AKY</scope><scope>GOX</scope></search><sort><creationdate>20240627</creationdate><title>Synthetic Embedding of Hidden Information in Industrial Control System Network Protocols for Evaluation of Steganographic Malware</title><author>Neubert, Tom ; Peuker, Bjarne ; Buxhoidt, Laura ; Schueler, Eric ; Vielhauer, Claus</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-a678-5d050c3b615a23137088d48cfc43aa7ecbb14f10517a76af08dfcc67fc0fa6f03</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2024</creationdate><topic>Computer Science - Cryptography and Security</topic><toplevel>online_resources</toplevel><creatorcontrib>Neubert, Tom</creatorcontrib><creatorcontrib>Peuker, Bjarne</creatorcontrib><creatorcontrib>Buxhoidt, Laura</creatorcontrib><creatorcontrib>Schueler, Eric</creatorcontrib><creatorcontrib>Vielhauer, Claus</creatorcontrib><collection>arXiv Computer Science</collection><collection>arXiv.org</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Neubert, Tom</au><au>Peuker, Bjarne</au><au>Buxhoidt, Laura</au><au>Schueler, Eric</au><au>Vielhauer, Claus</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Synthetic Embedding of Hidden Information in Industrial Control System Network Protocols for Evaluation of Steganographic Malware</atitle><date>2024-06-27</date><risdate>2024</risdate><abstract>For the last several years, the embedding of hidden information by steganographic techniques in network communications is increasingly used by attackers in order to obscure data infiltration, exfiltration or command and control in IT (information technology) and OT (operational technology) systems. Especially industrial control systems (ICS) and critical infrastructures have increased protection requirements. Currently, network defense mechanisms are unfortunately quite ineffective against novel attacks based on network steganography. Thus, on the one hand huge amounts of network data with steganographic embedding is required to train, evaluate and improve defense mechanisms. On the other hand, the real-time embedding of hidden information in productive ICS networks is crucial due to safety violations. Additionally it is time consuming because it needs special laboratory setup. To address this challenge, this work introduces an embedding concept to gene ate synthetic steganographic network data to automatically produce significant amounts of data for training and evaluation of defense mechanisms. The concept enables the possibility to manipulate a network packet wherever required and outperforms the state-of-the-art in terms of embedding pace significantly.</abstract><doi>10.48550/arxiv.2406.19338</doi><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier DOI: 10.48550/arxiv.2406.19338
ispartof
issn
language eng
recordid cdi_arxiv_primary_2406_19338
source arXiv.org
subjects Computer Science - Cryptography and Security
title Synthetic Embedding of Hidden Information in Industrial Control System Network Protocols for Evaluation of Steganographic Malware
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-22T12%3A33%3A07IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-arxiv_GOX&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Synthetic%20Embedding%20of%20Hidden%20Information%20in%20Industrial%20Control%20System%20Network%20Protocols%20for%20Evaluation%20of%20Steganographic%20Malware&rft.au=Neubert,%20Tom&rft.date=2024-06-27&rft_id=info:doi/10.48550/arxiv.2406.19338&rft_dat=%3Carxiv_GOX%3E2406_19338%3C/arxiv_GOX%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true