Accession Number:

AD1166896

Title:

Exploiting the IoT Through Network-based Covert Channels

Descriptive Note:

[Technical Report, Master's Thesis]

Corporate Author:

AIR FORCE INSTITUTE OF TECHNOLOGY WRIGHT-PATTERSON AFB OH

Personal Author(s):

Report Date:

2022-03-24

Pagination or Media Count:

74

Abstract:

Information leaks are a top concern to industry and government leaders. The IoT is a technology capable of sensing real-world events. A method for exfiltrating data from these devices is by covert channel. This research designs a novel IoT CTC without the need for inter-packet delays to encode data. Instead, it encodes data within preexisting network information, namely ports or addresses. Additionally, the CTC can be implemented in two different modes Stealth and Bandwidth. Performance is measured using throughput and detectability. The Stealth methods mimic legitimate traffic captures while the Bandwidth methods forgo this approach for maximum throughput. Detection results are presented using shape and regularity-based detection tests. The Stealth results have a throughput of 4.61 bits per second bps for TCP IP and 3.90 bps for ZigBee. They also evade shape and regularity-based detection tests. The Bandwidth methods average 81.7 Kbps for TCPIP and 9.76 bps for ZigBee, but are evident in detection tests.

Subject Categories:

  • Computer Systems

Distribution Statement:

[A, Approved For Public Release]