Volume 12 - Issue 4
Covert Channels in Transport Layer Security: Performance and Security Assessment
- Corinna Heinz
FernUniversitat in Hagen, Hagen, Germany
ch@sysv.de
- Marco Zuppelli
National Research Council of Italy, Genova, Italy
marco.zuppelli@ge.imati.cnr.it
- Luca Caviglione
National Research Council of Italy, Genova, Italy
luca.caviglione@ge.imati.cnr.it
Keywords: covert channels, transport layer security, network intrusion detection.
Abstract
The ability of creating covert channels within network traffic is now largely exploited by malware to
elude detection, remain unnoticed while exfiltrating data or coordinating an attack. As a consequence,
designing a network covert channel or anticipating its exploitation are prime goals to fully understand
the security of modern network and computing environments. Due to its ubiquitous availability and
large diffusion, Transport Layer Security (TLS) traffic may quickly become the target of malware
or attackers wanting to establish a hidden communication path through the Internet. Therefore, this
paper investigates mechanisms that can be used to create covert channels within TLS conversations.
Experimental results also demonstrated the inability of de-facto standard network security tools to
spot TLS-based covert channels out of the box.