You are currently viewing a new version of our website. To view the old version click .
Electronics
  • Article
  • Open Access

12 December 2020

Multilayer Detection of Network Steganography

,
and
1
Research & Development Department, Cryptomage SA, 50-130 Wrocław, Poland
2
Institute of Telecommunications, Warsaw University of Technology, 00-661 Warsaw, Poland
*
Author to whom correspondence should be addressed.
This article belongs to the Special Issue Cybersecurity and Data Science

Abstract

This paper presents a new method for steganography detection in network protocols. The method is based on a multilayer approach for the selective analysis of derived and aggregated metrics utilizing machine learning algorithms. The main objective is to provide steganalysis capability for networks with large numbers of devices and connections. We discuss considerations for performance analysis and present results. We also describe a means of applying our method for multilayer detection of a popular RSTEG (Retransmission Steganography) technique.

1. Introduction

Network steganography has recently gained considerable attention in the scientific community. Many new methods have been developed, and many more will be developed in the near future [1] as new network protocols are constantly being developed. This paper focuses solely on the detection of steganography techniques that operate at the network protocol level.
With the growing number of devices in networks, including IoT, network steganography detection faces new challenges in terms of both accuracy and performance [2]. To be performed effectively, steganography needs to operate:
  • In line with analyzed network traffic;
  • In near real-time regimes.
If detection is performed off-line or if it causes too much latency, there will be more traffic waiting to be analyzed than can actually be analyzed. Performance optimization is the main focus of the research described here since the main application of network steganography is real-time communication [3,4].
Some of the accurate detection methods tailored for specific network steganography techniques cannot be effectively implemented in real-time regimes because excessive computing and/or memory resources are needed [5]. This makes us question the overall accuracy of such methods since they are unable to analyze high-throughput traffic in a multi-host environment.
In this paper, we present a new method to introduce a compromise between detailed packet inspection and optimal detection performance. Our motivation is to provide a generic method that orchestrates network steganography detection in real-time regime, making it possible to implement in multi-host environments that generate high-throughput traffic. As a part of the method, we have presented a steganalysis layer selection method that provides an intelligent selection of steganalysis algorithms, preserving the balance between resource consumption and detection performance. To the authors’ best knowledge, this is the first generic network steganography detection method that utilizes a top-down approach for a detection method selection algorithm to ensure optimal computation resource allocation.

3. Multilayer Network Steganography Detection

3.1. Method Description

The core concept for our proposed method of network steganography detection is multilayer steganalysis and intelligent detection method selection based on packet classification and optimal resource utilization. We propose a top-down approach for a detection method selection algorithm as it ensures optimal computation resource allocation. In such an approach, we prefer high-layer metrics analysis over methods operating on low-level data (which would require more resources) unless high-level analyzers identify suspicious network traffic.
As shown in Figure 3, the first step is a packet capture (101), which acquires a single network packet from a hardware resource, such as a network card. The next step is feature extraction (102), which is the first stage of building a data model. Extracted features may include protocol headers and other derived data that can be calculated in near real-time. Extracted features serve as an input for metrics aggregation (103) and steganalysis layer selection (104). Metrics aggregation modules provide derived metrics operating on various aggregation layers. The scope of the metrics and calculation algorithms is determined by the steganalysis method(s) for which the method is to be applied. Examples of the metrics aggregation may include aggregated data counters, port utilization, etc. The main assumption for metrics aggregation is that high-layer metrics computation should consume fewer resources and take less time than the computation of low-layer metrics, as shown in Figure 4. We named the lowest-layer metrics “1st layer aggregated metrics” and the highest-layer metrics “Nth layer aggregated metrics.”
Figure 3. Multilayer detection method description.
Figure 4. Aggregated Metrics hierarchy.
The calculated metrics and features extracted from each packet serve as input for steganalysis layer selection (104), which determines the optimal steganalysis layer. We discuss the steganalysis layer selection in Section 3.2.
The Steganography Detection module (105) comprises multiple steganalysis methods. Each steganalysis method is assigned to a specific layer, based on the method’s complexity and, in particular, on its resource utilization. Given a maximum of N layers of steganalysis methods, and a function L(m) defining real-time operating resource consumption for each method m belonging to the set of methods M, the following is assumed:
m M ( L ( m ) < L ( m 1 ) ) ,   p r o v i d e d   t h a t   N   m > 1
In other words, steganalysis methods in higher layers require fewer resources to effectively detect network steganography in the real-time regime. Steganography detection methods in each layer may, but do not have to, operate on corresponding aggregated metrics layers.
The result of the performed multilayer steganalysis is provided to the steganography layer selection module to update the classification rules.

3.2. Steganalysis Layer Selection

The performance of our proposed method relies on the accuracy of the steganalysis layer selection algorithm and its parameters. In order to achieve better results, the algorithm should be tailored to fit specific performance requirements and at least the anticipated types of steganography technique. We suggest the following selection method, which should suffice for most applications.
As shown in Figure 5, the steganalysis layer selection method can operate in two modes:
Figure 5. Steganalysis layer selection method.
  • Rule learning;
  • Packet classification.
In the first mode, the method applies various machine learning algorithms for frequent pattern mining, classification, and clustering to the steganalysis result (204) provided by the layered steganalysis module, computed anomaly scoring (205), and aggregated metrics (201). Learned rules are stored in memory (203) for the anomaly scoring module and packet classification.
In the second mode, the layer selection method receives a packet’s extracted features (206) to classify the packet (207) for the selection of the optimal steganalysis layer (208). Packet classification (207) operates on previously learned rules and may use various classification methods and metrics, including but not limited to network address classification, network protocol classification, and TCP/UDP port classification.
The selection and application of specific algorithms for frequent pattern mining, classification, and clustering utilized by the rule learner module (202) are beyond the scope of this research work as they are widely discussed in the literature [21,22]. However, we recommend the k-means clustering for mining a predefined number of clusters of network devices, the FP-growth algorithm for frequent pattern mining, and an optimized SVM (Support-Vector Machine) trainer [23] for classification.

3.3. Applicability

Our proposed method can be applied to optimize the detection of the most known network steganography techniques shown in Figure 2. The spectrum of detected steganographic techniques relies on network steganography detection methods utilized by the presented multilayer detection method. In Table 1, we outline the potential advantages and disadvantages of applying our multilayer network steganography detection method to each group of techniques.
Table 1. Applicability of detection method.
Based on the above findings, we suggest limiting the use of our method to stream modification and hybrid network steganography detection.

4. Case Study

4.1. Experiment Scope and Methodology

To measure the crucial features of the proposed method, we decided to perform an experiment by applying the method to a chosen network steganographic technique. The main need was to evaluate steganalysis time and its characteristics. To perform accurate measurements, we needed to choose a steganographic technique that has the following features:
  • There exists a detection method that compares raw network traffic;
  • There exists a detection method that operates on the 1st layer of aggregated metrics;
  • There exists a detection method that operates on the 2nd layer of aggregated metrics;
  • The method preferably operates under the application layer.
The above set of features ensures that the proposed method application is best utilized and operates on at least three layers. In our opinion, applying the proposed method to any steganographic technique satisfying the requirements above should provide performance gains, depending on the chosen steganalysis methods on each layer. Given the requirements, we chose to apply our method to RSTEG (retransmission steganography) [5,13,24]. The application to RSTEG detection provides us a set of steganalysis methods, presented in the literature, that can operate on aggregated metrics as well as raw data.
The main idea of RSTEG is to not acknowledge a successfully received packet in order to intentionally invoke retransmission. The retransmitted packet carries a steganogram instead of user data in the payload field [5]. Although RSTEG is intended for a broad class of protocols that utilize retransmission mechanisms, we chose to conduct the experiment on hidden communication detection in TCP/IP networks.
The objective of our case study is to document the performance of network steganography detection utilizing steganalysis method(s) individually and in the multilayer approach presented in this paper. Various RSTEG steganalysis methods can be implemented using a passive warden [25] in the architecture we describe in Section 4.2. We proposed detection methods and assigned them to particular layers.
We measured packet processing time to determine the effectiveness of the method. We divided the experiment into two parts:
  • Communication capture;
  • Capture analysis.
Processing time was measured between the times the warden started and finished analyzing captured traffic. All measurements were performed on ~100 MB chunks of ~5 GB of captured network traffic on a virtual machine with a single CPU and 2 GB of RAM. Each measurement was repeated 10 times to provide average results.

4.2. RSTEG Steganalysis Methods

The most effective methods for RSTEG communication in TCP/IP networks are based either on payload comparison or anomaly detection in derived stream metrics, i.e.:
  • Comparison of the retransmitted and original payload;
  • Anomaly detection in the number of retransmissions for an individual connection;
  • Anomaly detection in the number of retransmissions for an individual device.

4.2.1. Comparison of the Retransmitted and Original Payload

The method of detection based on a comparison of retransmitted and original payload operates on the assumption that every retransmitted TCP segment should have a similar payload to the original one. Any outliers can be safely assumed to be carrying steganograms.
Processing and memory requirements for this method are excessive [5] and limit the method’s application to selected network connections only. Required resources scale with the amount of transmitted data and the number of network connections.
Based on the above description, we assign this method to the “Raw Data Steganalysis” layer.

4.2.2. Anomaly Detection in a Number of Retransmissions for an Individual Connection

Anomaly detection in a number of retransmissions for an individual connection requires the following operations to be performed:
  • Determining whether an individual packet is retransmitted;
  • Determining the TCP segment retransmission ratio for an individual network connection;
  • Outlier detection in the TCP segment retransmission ratio for an individual network connection.
Based on the fact that all of the above steps operate on a packet’s extracted features and aggregated metrics, we assign this method to the first layer.

4.2.3. Anomaly DETECTION in a number of Retransmissions for an Individual Device

The method of anomaly detection in a number of retransmissions for an individual device is similar to the method presented above but operates in a broader scope. In this approach, the retransmission ratio for all network device traffic is determined, and outliers are detected.
Based on the fact that this method operates in a higher layer of aggregated metrics, we assign this method to the second layer.

4.3. Architecture

We conducted the experiment utilizing the following architecture for data capture and further investigation.
The architecture presented in Figure 6 comprises two endpoints: Alice (303) and Bob (311), who have established an RSTEG channel and are exchanging steganograms, among other network traffic. Bob’s endpoint resides in a local network (310) in which all network traffic goes through the core router (312). The core router sends a copy of all traffic to the passive warden (313). Communication coming from other network devices (314) not necessarily involved in steganographic communication is also analyzed.
Figure 6. Implementation architecture.

4.4. Results

To provide an overview of multilayer steganalysis method performance, we measured the processing time for the methods applied in each layer as well as the total processing time required by our method. Each measurement was performed using the methodology described in Section 4.1.
As shown in Table 2, an increased ratio of retransmissions in the network causes an increase in processing time despite the chosen method(s). Processing time increases significantly for lower layers of steganalysis methods, including raw data steganalysis.
Table 2. Steganalysis performance.
In Figure 7, we show the steganalysis time for raw data steganalysis in the retransmission ratio domain. As the chart shows, an increase in the network retransmission ratio causes an increase in the processing time; this increase can be approximated by a linear function. Given that raw data steganalysis for RSTEG means storing, iterating, and comparing retransmitted segments with the original ones, the substantial near-linear increase in processing time is fully legitimate.
Figure 7. Raw Data Steganalysis time.
In Figure 8, we show the steganalysis time for the first-layer steganalysis in the retransmission ratio domain, which also includes raw data steganalysis for selected traffic. For RSTEG application, the method directs TCP segments belonging to connections that qualified as outliers for further raw data steganalysis, which means payload comparison.
Figure 8. First-layer Steganalysis time.
The results also show an increase that can be approximated by a linear function, which makes sense because of the significant overhead required for processing separate connections, anomaly detection, and the potentially higher number of segments directed to lower-layer steganalysis.
In Figure 9, we show the steganalysis time for second-layer steganalysis in the retransmission ratio domain. Second-layer steganalysis involves selectively directing network traffic to first-layer steganalysis as well as raw data steganalysis. In our application, the method analyzes the retransmission ratio in the context of an individual network device, then directs outlier devices to the method that analyzes network connections and directs outlier traffic to payload comparison for retransmitted segments (raw data steganalysis).
Figure 9. Second-layer steganalysis time.
The results show a non-linear increase in processing time, which can be closely approximated by a third-order polynomial function. Given that the method operates on the highest layer of aggregated metadata, a non-linear increase in processing time is justified. The second-layer method brings the most substantial gain in steganalysis, with an increasing retransmission ratio in our case.
The percentage gain in processing time when multilayer detection is applied is shown in Figure 10 and Table 3. The results show a significant performance gain for higher-layer detection methods (as expected). However, the gain slightly decreases in comparison to the lowest retransmission ratio applied (1%). This is a result of method selection algorithm overhead and aggregation of required metrics.
Figure 10. Steganalysis performance gain.
Table 3. Steganalysis performance gain.

5. Conclusions

Multilayer steganography detection is a method that utilizes a top-down approach for network steganography detection and introduces an intelligent choice of steganographic methods applied to specific network traffic. As a part of the method, we have presented a steganalysis layer selection method that provides an intelligent selection of steganalysis algorithms, preserving the balance between resource consumption and detection performance. To the authors’ best knowledge, this is the first generic network steganography detection method that utilizes a top-down approach for a detection method selection algorithm to ensure optimal computation resource allocation.
We have described the method’s concept and its key components and discussed the method’s applicability for network steganography detection in the context of known data-hiding methods. We also considered steganography detection in real networks in a wider context. The method requires the use of other existing network steganography detection methods for optimum effectiveness. The main novelty of the proposed method is providing a capability for intelligent selection of the best-fit steganalysis method for analyzed network traffic to maintain optimal resource utilization. Other generic detection methods presented so far do not provide orchestration for network steganography detection.
We applied our method for the detection of the RSTEG data-hiding method, presented the proposed detection techniques and assigned them to specific layers. The results demonstrated the method’s performance gain over the steganalysis of raw network data. The presented characteristics of performance gain lead us to the conclusion that the method’s application for real-time steganalysis is promising as it introduces a non-linear increase in processing time.
We suggest the following areas of future research:
  • Performance scaling of required resources;
  • Application of the method to other network steganography techniques;
  • Application of the method to steganography detection in a broader context not tied to TCP/IP networks.

Author Contributions

M.S. contributed to theoretical formulation, design methodology, dataset development, experiment design and implementation, results interpretation, original draft preparation and revision. The other authors (K.S., J.P.) contributed to project supervision, theoretical formulation, result interpretation, and revision of the initial draft. All authors have read and agreed to the published version of the manuscript.

Funding

This scientific research work was co-financed by the European Union, project name: “The system for identification and monitoring of anomalies and risks in ICT networks”. The amount financed by the European Union was EUR 1,044,534.63. The investment outlay value for the entire project was EUR 1,407,526.46. The subsidy was allocated from the European Regional Development Fund, Operational Program “Smart Growth”, sub-measure 1.1.1 “Industrial research and development work implemented by enterprises” (grant number: POIR.01.01.01-00-0554/15).

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Tanwar, R.; Malhotra, S.; Singh, K. Future of Data Hiding: A Walk through Conventional to Network Steganography, in Cyberspace Data and Intelligence, and Cyber-Living, Syndrome, and Health; Springer Science and Business Media LLC: Berlin, Germany, 2020; Volume 1230, pp. 123–132. [Google Scholar]
  2. Nafea, H.; Kifayat, K.; Shi, Q.; Qureshi, K.N.; Askwith, B. Efficient Non-Linear Covert Channel Detection in TCP Data Streams. IEEE Access 2020, 8, 1680–1690. [Google Scholar] [CrossRef]
  3. Collins, J.; Agaian, S. Trends Toward Real-Time Network Data Steganography. Int. J. Netw. Secur. Its Appl. 2016, 8, 1–21. [Google Scholar] [CrossRef]
  4. Seo, J.; Manoharan, S.; Mahanti, A. Network steganography and steganalysis—A concise review. In Proceedings of the 2016 2nd International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT), Bengaluru, India, 21–23 July 2016; pp. 368–371. [Google Scholar]
  5. Mazurczyk, W.; Smolarczyk, M.; Szczypiorski, K. Retransmission steganography and its detection. Soft Comput. 2009, 15, 505–515. [Google Scholar] [CrossRef]
  6. Lubacz, J.; Mazurczyk, W.; Szczypiorski, K. Principles and overview of network steganography. IEEE Commun. Mag. 2014, 52, 225–229. [Google Scholar] [CrossRef]
  7. Frączek, W.; Mazurczyk, W.; Szczypiorski, K. Hiding information in a Stream Control Transmission Protocol. Comput. Commun. 2012, 35, 159–169. [Google Scholar] [CrossRef]
  8. Grabski, S.; Szczypiorski, K. Network steganalysis: Detection of steganography in IEEE 802.11 wireless networks. In Proceedings of the 2013 5th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT), Almaty, Kazakhstan, 10–13 September 2013; pp. 13–19. [Google Scholar]
  9. Goher, S.Z.; Javed, B.; Saqib, N.A. Covert channel detection: A survey based analysis. In Proceedings of the 9 th International Conference on High Capacity Optical Networks and Emerging/Enabling Technologies, Istanbul, Turkey, 12–14 December 2012; pp. 57–65. [Google Scholar] [CrossRef]
  10. Bieniasz, J.; Stepkowska, M.; Janicki, A.; Szczypiorski, K. Mobile agents for detecting network attacks using timing covert channels. J. Univ. Comput. Sci. 2019, 25, 1109–1130. [Google Scholar]
  11. Lu, S.; Chen, Z.; Fu, G.; Li, Q. A Novel Timing-based Network Covert Channel Detection Method. J. Phys. Conf. Ser. 2019, 1325, 012050. [Google Scholar] [CrossRef]
  12. Szczypiorski, K.; Tyl, T. MoveSteg: A Method of Network Steganography Detection. Int. J. Electron. Telecommun. 2016, 62, 335–341. [Google Scholar] [CrossRef]
  13. Mazurczyk, W.; Smolarczyk, M.; Szczypiorski, K. On information hiding in retransmissions. Telecommun. Syst. 2011, 52, 1113–1121. [Google Scholar] [CrossRef][Green Version]
  14. Mazurczyk, W.; Lubacz, J. LACK—a VoIP steganographic method. Telecommun. Syst. 2010, 45, 153–163. [Google Scholar] [CrossRef]
  15. Cabaj, K.; Mazurczyk, W.; Nowakowski, P.; Żórawski, P. Fine-tuning of Distributed Network Covert Channels Parameters and Their Impact on Undetectability. In Proceedings of the 14th International Conference on Availability, Reliability and Security—ARES ’19, Canterbury, UK, 26–29 August 2019; pp. 1–8. [Google Scholar] [CrossRef]
  16. Chourib, M. Detecting Selected Network Covert Channels Using Machine Learning. In Proceedings of the 2019 International Conference on High Performance Computing & Simulation (HPCS), Dublin, Ireland, 15–19 July 2019; pp. 582–588. [Google Scholar]
  17. Mazurczyk, W.; Szczypiorski, K.; Jankowski, B. Towards steganography detection through network traffic visualisation. In Proceedings of the 2012 IV International Congress on Ultra Modern Telecommunications and Control Systems, Petersburg, Russia, 3–5 October 2012; pp. 947–954. [Google Scholar] [CrossRef]
  18. Chandramouli, R.; Subbalakshmi, K. Current trends in steganalysis: A critical survey. In Proceedings of the ICARCV 2004 8th Control, Automation, Robotics and Vision Conference, Kunming, China, 6–9 December 2004; pp. 964–967. [Google Scholar]
  19. Krenn, J.R. Steganography and Steganalysis, Internet Publication. Available online: http://www.krenn.nl/univ/cry/steg/article.pdf (accessed on 9 December 2020).
  20. Zeng, W.; Ai, H.; Hu, R.; Gao, S. An algorithm of echo steganalysis based on Bayes classifier. In Proceedings of the 2008 International Conference on Information and Automation, Changsha, China, 20–23 June 2008; pp. 1667–1670. [Google Scholar]
  21. Zhao, S.; Chandrashekar, M.; Lee, Y.; Medhi, D. Real-time network anomaly detection system using machine learning. In Proceedings of the 2015 11th International Conference on the Design of Reliable Communication Networks (DRCN), Kansas City, KS, USA, 24–27 March 2014; pp. 267–270. [Google Scholar]
  22. Bieniasz, J.; Sapiecha, P.; Smolarczyk, M.; Szczypiorski, K. Towards model-based anomaly detection in network communication protocols. In Proceedings of the 2016 2nd International Conference on Frontiers of Signal Processing (ICFSP), Warsaw, Poland, 15–17 October 2016; pp. 126–130. [Google Scholar]
  23. Franc, V.; Sonnenburg, S. Optimized Cutting Plane Algorithm for Large-Scale Risk Minimization. J. Mach. Learn. Res. 2009, 10, 2157–2192. [Google Scholar]
  24. Mazurczyk, W.; Smolarczyk, M.; Szczypiorski, K. Retransmission Steganography Applied. In Proceedings of the 2010 International Conference on Multimedia Information Networking and Security, Nanjing, China, 4–6 November 2010; pp. 846–850. [Google Scholar]
  25. Fisk, G.; Fisk, M.; Papadopoulos, C.; Neil, J. Eliminating Steganography in Internet Traffic with Active Wardens. In Computer Vision—ECCV 2020; Springer Science and Business Media LLC: Berlin, Germany, 2002; pp. 18–35. [Google Scholar]
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Article Metrics

Citations

Article Access Statistics

Multiple requests from the same IP address are counted as one view.