<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Detection of Network Covert Channels in IoT Ecosystems Using Machine Learning⋆</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Massimo Guarascio</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Marco Zuppelli</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Nunziato Cassavia</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Giuseppe Manco</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Luca Caviglione</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>ICAR - Institute for High Performance Computing and Networking</institution>
          ,
          <addr-line>Via Pietro Bucci, cubo 8/9C - 87036, Rende</addr-line>
          ,
          <country country="IT">Italy</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>IMATI - Institute for Applied Mathematics and Information Technologies</institution>
          ,
          <addr-line>Via de Marini, 6 - 16149, Genova</addr-line>
          ,
          <country country="IT">Italy</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>ITASEC'22: Italian Conference on Cybersecurity</institution>
        </aff>
      </contrib-group>
      <abstract>
        <p>Steganographic techniques and covert channels are becoming exploited by a wide-range of malware to avoid detection and bypass network security tools. With the ubiquitous difusion of IoT nodes, such ofensive schemes are expected to be used to exfiltrate data or to covertly orchestrate botnets composed of resource-constrained nodes (e.g., as it happens in Mirai). Therefore, in this paper, we present a machine learning technique for the detection of network covert channels targeting the TTL field of IPv4 datagrams. Specifically, we propose to use Autoencoders to reveal anomalous trafic behaviors. The experimental evaluation performed over realistic trafic traces showcases the efectiveness of our approach.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;Covert Channel</kwd>
        <kwd>Autoencoder</kwd>
        <kwd>IoT Security</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        The Internet of Things (IoT) paradigm allows to create advanced services able to interact with
the physical world and to remotely operate large-scale infrastructures. As a result, the number
of applications taking advantage of IoT technologies is now almost unbounded. For instance,
cost-efective sensors and devices are used for entertainment and health purposes, to access and
manage industrial control systems, as well as to automatize homes and buildings. Unfortunately,
the tight coupling between devices and physical entities, the resource-constrained nature of
many nodes, and the lack of rigorous development or configuration processes, are at the basis
of countless security and privacy flaws [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ].
      </p>
      <p>
        Despite IoT nodes are often considered simple devices, they can be used to implement efective
threats. As an example, the Mirai malware allows to create a large-scale botnet of devices with
limited computing and connectivity resources, which has been used to launch Distributed Denial
of Service (DDoS) attacks against many international organizations and sensitive targets [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ].
In addition, IoT nodes can be enumerated to infer details on the physical deployment [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ] and
their trafic can be inspected to implement various side-channel-based techniques or to conduct
reconnaissance campaigns [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]. Therefore, a major efort is devoted to make IoT ecosystems
more secure, but this could be partially voided by the recent trend of developing malware able
to remain undetected and bypass classical network security mechanisms. This new class of
threats takes advantage of various information hiding and steganographic techniques to conceal
malicious payloads in innocent-looking software assets, retrieve additional configuration files
without being noticed, or covertly exfiltrate hidden information [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]. Among the various attack
mechanisms, the adoption of network covert channels, i.e., cloaked and parasitic communication
paths nested within legitimate trafic flows, is gaining momentum. Specifically, network covert
channels can be exploited to establish Command &amp; Control (C&amp;C) communications, as well
as to bypass intrusion detection/prevention systems and firewalls for stealthily exchange vast
volumes of personal data [
        <xref ref-type="bibr" rid="ref4 ref5">5, 4</xref>
        ]. A recent example of attack using a network covert channel is
Sunburst, which hides commands in HTTP trafic 1. Due to the ubiquitous availability of devices
always connected to the Internet, their intrinsic interaction with sensitive data, as well as several
design flaws and limitations, completely assessing the security of IoT deployments requires also
to consider threats endowed with network covert channels capabilities. To develop suitable
mitigation techniques, machine learning approaches demonstrated to be efective for detecting
a multitude of network attacks and to implement general intrusion detection mechanisms [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ].
Unfortunately, countermeasures against network covert channels are poorly-generalizable, since
each hiding mechanism and network protocol have specific traits and behaviors [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ]. For instance,
using some form of AI to reveal a channel hidden within DNS trafic [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ] requires a complete
diferent inspection mechanism and metrics compared to the case of parasitic communications
targeting IPv6 conversations [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ]. As a result, the literature abounds of attack-specific detection
methodologies and working towards a unique framework is still an open research problem
(see, e.g., [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ] for a recent survey on the topic). A diferent case concerns the detection of
timing channels, which are created by encoding information in temporal statistics of network
trafic. To this aim, the secret information is usually hidden within the inter-packet time or in
the throughput characterizing a specific stream or network conversation [
        <xref ref-type="bibr" rid="ref5 ref7">5, 7</xref>
        ]. Owing to the
protocol-agnostic trait of timing protocols, several works using machine learning have been
proposed [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ] even by exploiting techniques originally introduced for image processing [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ].
      </p>
      <p>
        Therefore, in this work we address the problem of detecting network covert channels targeting
the TTL field of IPv4 datagrams. In fact, the resource-constrained nature of IoT devices, including
the use of “lean” TCP/IP protocol stacks to tame complexity, prevent malware to implement
sophisticated covert channels or computing-intensive network steganography algorithms. To
develop our detection methods, we take advantage of autoencoders, which are neural networks
where the target of the network is the data itself. Autoencoders allow to reduce dimensionality
and to learn eficient encoding, whereas they are a convenient choice when in absence of a
labeled dataset. This is of prime importance when addressing malware exploiting network covert
channels, since it often remains undetected or undocumented until major reverse engineering
or forensics investigations [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ]. As regards prior works considering covert channels targeting
1An updated list of attacks leveraging information hiding, steganography, and covert channels observed “in the
wild” is available online at: https://github.com/lucacav/steg-in-the-wild [Last Accessed: June 2022].
      </p>
      <p>Covert Channel</p>
      <p>Secret encoded</p>
      <p>in the TTL</p>
      <p>Firewall
(Home Gateway)
Legitimate Traffic</p>
      <p>Legitimate Traffic + Covert Channel</p>
      <p>Remote
C&amp;C Server</p>
      <p>IOT Ecosystem
Figure 1: Attack model considering a malware sending data towards a remote command and control
facility via a network covert channel created within the TTL field of IPv4 trafic.</p>
      <p>
        IoT scenarios, the literature mainly focuses on timing channels, for instance to detect cloaked
communications in SCADA applications [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ] or in the Constrained Application Protocol [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ].
      </p>
      <p>Summing up, the contributions of this work are: the design of a machine-learning-capable
approach for detecting covert channels targeting IoT ecosystems, and a performance evaluation
campaign based on realistic trafic traces commonly used in the literature. Since countermeasures
could be also deployed at the border of the network in nodes with limited capabilities (e.g.,
home gateways) emphasis has been put on the footprint required by the proposed approach.</p>
      <p>The remainder of the paper is structured as follows. Section 2 provides details on the
considered attack model, Section 3 introduces our approach to detect covert channels targeting the
TTL of IPv4 datagrams, and Section 4 showcases numerical results. Finally, Section 5 concludes
the paper and outlines possible future research directions.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Attack Model and Design of the Covert Channel</title>
      <p>
        This section discusses the attack model taking advantage of a network covert channel. Figure
1 showcases the general reference scenario. Specifically, we consider an attacker able to take
control of one or more IoT nodes, for instance by dropping a malicious payload via a phishing
campaign [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. The infected device will then create a network covert channel to exfiltrate data
towards a remote C&amp;C server or to exchange commands with the attacker, e.g., to configure
a backdoor or operate a botnet. Relying upon a network covert channel allows to bypass a
ifrewall or specific security policies enforced by a middlebox, such as a home gateway.
      </p>
      <p>
        Even if the literature abounds of techniques for creating cloaked communication paths within
network flows and real-world threats taking advantage of information hiding are multiplying
[
        <xref ref-type="bibr" rid="ref16 ref5 ref7">5, 7, 16</xref>
        ], the resource-limited nature of IoT nodes poses constraints on the complexity of the
covert channel. As a consequence, the embedding mechanism should be simple in order to
not disclose the presence of the malware due to perceptible lags or anomalous depletion of
batteries. At the same time, since IoT trafic often requires some form of Quality of Experience
(e.g., to not postpone the execution of commands sent by the user), trafic alterations and the
introduction of additional delays should be limited. Therefore, we consider a malware cloaking
data within the TTL field of the IPv4 header [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ]. In more detail, the TTL is manipulated to
implement a storage network covert channel and transport arbitrary information. Due to the
varying nature of the TTL and to not appear suspicious, the malware should not directly write
the secret data in the field [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ]. Rather, it can encode the bits 1 and 0 by increasing or decreasing
the observed TTL of a suitable threshold or by using most common values as “high” and “low”
signals. Finding proper TTL values is not trivial, since their diference should be ample enough
to absorb fluctuations caused by alterations of the routing and to prevent decoding errors,
while not reducing the stealthiness of the channel. To design the covert channel, the attacker
usually investigates the targeted network to understand “clean” trafic conditions and adapt
the hiding mechanism. To tune the channel, we considered the collection of IoT trafic made
available in [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]. As an example, we showcase results for the 24-hour slice of data captured from
September 22, 2016 at 16:00 to September 23, 2016 at 16:00, CEST2. Without loss of generality
and to prevent burdening results, we removed IPv6, ICMP, DNS and NTP conversations, in
addition to multicast/broadcast trafic. Figure 2 depicts heatmaps for the collected TTL values.
As depicted in Figure 2a, the values observed for the TTL are clusterized, especially in the
32 − 64 and 208 − 224 ranges. This requires the attacker to encode information without using
values never observed in normal conditions. Yet, trafic conditions are not static, hence, we
refined our analysis by resetting the observed values each hour. Figure 2b portraits results.
As shown, some values of the TTL are always present in the trafic (e.g., those around 48),
whereas others have an intermittent behavior. For instance, datagrams with a TTL equal to 128
are present only for 3 hours (i.e., from 13-th to the 16-th hours). This puts constraints on the
temporal location of channels using a TTL equal to 128 as well as on their duration.
      </p>
      <p>
        In general, channels targeting the TTL should alter datagrams in a limited manner in order to
avoid macroscopic per-flow signatures [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ]. Moreover, TTL values highly depend on the type
of nodes, hosts and appliances exchanging trafic through the network. In fact, Android and
iOS devices as well as Linux hosts generate trafic with a default TTL of 64, whereas Windows
nodes use a default TTL of 128 [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ]. Thus another important trade of should aim at avoiding
to make the channel detectable via simple host/OS fingerprinting mechanism
      </p>
    </sec>
    <sec id="sec-3">
      <title>3. Detecting Covert Channels With Autoencoders</title>
      <p>This section describes the deep learning-based approach adopted to identify the presence
of covert channels within trafic flows. In our scenario, the detector takes the form of an
unsupervised deep neural network. The main benefit of our approach is the possibility of the
model to raise alarms also on never seen attacks: this is a frequent case when dealing with
covert channels, since they are often undocumented and unknown a priori. Moreover, this
solution allows for coping with the lack of labeled data issue, typical of our application scenario.</p>
      <p>Specifically, our solution allows for learning a neural encoder-decoder network aiming
at compressing the input data (represented by metrics computed over the trafic generated
by the IoT network) within a latent space, which is then used to reconstruct the original
information. Here, the main idea is that the legitimate input data should be slightly afected by
the encoding/decoding procedures performed by the model, therefore the original distributions
2Data collected for IEEE TMC 2018, University of New South Wales, Sydney. Available online at: https://iotanalytics.
unsw.edu.au/iottraces.html [Last Accessed: June 2022].
80
60
40
20
skip connection
skip connection
0 61 32 48 64 80 96 112 128 441 160 176 192 208 224 240 255 0</p>
      <p>TTL
substantially remain unchanged after this process. By contrast, anomalous instances will exhibit
deviant values that can lead to failures in the input reconstruction.</p>
      <p>
        Although the idea to use the reconstruction error as an anomaly score to identify deviant
behaviors is not new itself, the adoption of unsupervised techniques (and in particular of
autoencoder-based solutions) for detecting covert channels is quite unexplored [
        <xref ref-type="bibr" rid="ref10 ref11 ref6">6, 11, 10</xref>
        ].
Hence, the use of autoencoders [19, 20] represents an efective approach to the unsupervised
task of learning a compressed representation able to efectively summarize the main information
contained in the input data. In essence, it can be thought as a neural network whose aim consists
in yielding as output a duplicate (as close as possible) similar to the input data.
      </p>
      <p>Figure 3 shows the considered neural architecture. As shown, the architecture is composed
of two main components, named Encoder and Decoder, respectively. Let  = {1, . . . ,  } be a
set of numeric features (in our scenario, a set of statistics computed on the network trafic flow
yielded in a time slot). The former subnet allows for mapping z = enc(x) the input data with a
latent space (encoding), whereas the second one maps the features extracted by the encoder
with the output y = dec(z) (decoding). Gradient descent is used to learn the model weights by
minimizing a suitable reconstruction loss. In this paper, we adopted the Mean Square Error, i.e.,
 () = 1 ∑︀ ‖xi − yi‖2.</p>
      <p>Notably, the architecture shown in Figure 3 exhibits two main diferences with respect
to a standard encoder-decoder model: (i) Skip Connections are used to boost the predictive
performances of the model and to reduce the number of iterations required for the learning
algorithm convergence, and (ii) a hybrid approach including the usage of Sparse Dense Layers is
adopted to make the autoencoder more robust to noise, especially since attacks often exhibit
slight diferences compared with normal behaviors. In more detail, the idea behind Skip
Connections is to “help” the learning phase of the decoder by providing as input to each layer
of the decoder both the previous and the correspondent encoder layer. As regard the use of
Sparse Dense Layers, this allows for yielding a wider number of discriminative features that
can be used to extract a more efective latent representation.</p>
      <p>
        Figure 4 shows how the detection of covert channels targeting the TTL of IPv4 datagrams
is performed. Without loss of generality, we assume to monitor an infinite datastream, i.e.,
the trafic produced by the various IoT nodes continuously feeds our detection mechanism.
At pre-fixed time intervals (corresponding to a time slot in Figure 4), we compute a number
of statistics to describe the behavior of the TTL fields composing the aggregate trafic flow.
This operation can be performed without impacting on the overall trafic and by using limited
computing resources (see, e.g., the use of the extended Berkeley Packet Filter (eBPF) [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ]). In
more detail, we compute metrics such as the min, average, max, diferent percentiles, etc.,
starting from TTL values gathered from the packets composing the inspected trafic aggregate.
First, an autoencoder, pretrained only against legitimate data flows, is used to reproduce the
statistics, then reconstruction error is computed for the current example as the MSE between 
and . Finally, if the error is lesser than a given outlierness threshold, the current data are labeled
as “normal” and exploited to update the model, otherwise a warning is raised.
      </p>
    </sec>
    <sec id="sec-4">
      <title>4. Performance Evaluation</title>
      <p>In this section we present the performance of the approach based on autoencoders. Preliminary,
we discuss the used dataset, then we showcase numerical results.</p>
      <sec id="sec-4-1">
        <title>4.1. Dataset Preparation</title>
        <p>
          To evaluate the efectiveness of our approach for detecting network covert channels targeting
IoT ecosystems, we prepared an artificial dataset starting from the trafic traces made available in
[
          <xref ref-type="bibr" rid="ref3">3</xref>
          ]. In more detail, we used datasets containing trafic collected from September 22, 2016 at 16:00
to September 29, 2016 at 16:00, CEST. Similarly to the example of Section 2, we removed IPv6,
ICMP, DNS and NTP conversations as well as multicast/broadcast trafic. To avoid unwanted
signatures/fingerprints, we also removed trafic generated by non-IoT devices, such as mobile
packeti
packeti-1
packeti-2
m packeti-3
ra
e
tta packeti-4
S
a
D packeti-5
packeti-6
        </p>
        <p>...
packeti-p
slotj
slotj-1
phones and laptops. We then obtained a 1-week long dataset with an overall throughput in the
5 − 36 kbit/s range, generated by 28 IoT endpoints, such as speakers, lights, cameras, and hubs.</p>
        <p>To implement the considered attack template in a realistic manner, we modeled the presence
of a threat tampering a single IoT device. As an example, the attacker could gain access to
the assets of the victim via phishing or by exploiting some ad-hoc CVEs3. In our scenario,
we considered a malicious software targeting the Dropcam camera, which has been used to
send/exfiltrate sensitive data towards a remote C&amp;C facility. To have a dataset containing fair
amounts of “legitimate” and cloaked conversations, we assumed that the IoT device has been
tampered on September 27, thus the Dropcam has been under control of the attacker for 3 days.</p>
        <p>
          To create the various storage network covert channels, we used the tool available in [21],
which allows to directly rewrite the trafic captures and implement realistic attack conditions.
As discussed in Section 2, to not make the detection trivial, we encoded bits 1 and 0 in TTL
values equal to 64 and 100, respectively. Moreover, we randomly interleaved packets containing
hidden data with legitimate/unaltered packets in order to prevent long bursts of manipulated
TTL values. In fact, the latter could reduce the stealthiness of the covert channel leading to
a trivial detection [
          <xref ref-type="bibr" rid="ref17">17</xref>
          ]. Such a behavior can be ascribed to an attacker switching the hidden
communication among two states (i.e., exfiltrate data and not manipulate trafic) to remain
unnoticed via elusive mechanisms. To avoid further statistical signatures, the secret data
transmitted over the covert channel has been modeled with randomly-generated strings: this
represents an attacker using some obfuscation technique, e.g., encryption or scrambling [22].
Concerning the volume of data transmitted within the covert channel, we modeled each day of
attack with a diferent template. Specifically, we considered the exfiltration of 69, 80, and 64
kbit of data. Such volumes can represent sensitive information like several username+password
pairs or configuration details of a specific IoT device or smart hub. Moreover, assuming covert
transmissions in the 64 − 80 kbit range allowed to have an IoT node accounting for a variable
amount of steganographically-modified trafic. In more detail, the compromised IoT node
3List of CVEs targeting IoT nodes/devices maintained by MITRE. Available online at: https://cve.mitre.org/cgi-bin/
cvekey.cgi?keyword=iot [Last Accessed: June 2022].
manipulates the 18%, 1%, and 12% of the overall daily trafic, respectively.
        </p>
      </sec>
      <sec id="sec-4-2">
        <title>4.2. Pre-processing, Parameters and Evaluation Metrics</title>
        <p>To test our approach for revealing the presence of network covert channels within trafic
aggregates, we developed a prototype in Python based on the TensorFlow4 library. The trafic
dataset presented in Section 4.1 has been processed to obtain the following information: a
progressive timestamp, the number of incoming packets within a given time slot, the average
and median values of observed TTLs, the values of the 10ℎ, 25ℎ, 75ℎ and 90ℎ percentile,
minimum and maximum TTLs, as well as a label indicating the presence of the attack (i.e., for
testing purposes). Recalling that our approach exploits a “slotted” architecture (see Figure 4), in
this work we consider a time slot with a duration of 5 seconds.</p>
        <p>The dataset has been divided in training and test sets by using a temporal split. Specifically:
(i) the data gathered in the first 96 hours only contains legitimate trafic and has been used for
the learning phase of the autoencoder, whereas (ii) the remaining instances compose the test
set. As a result, the training and the test set have 69, 116 and 51, 837 instances, respectively.
To normalize the input data feeding the model, a pre-processing phase has been performed. In
essence, a MinMax normalization has been used to map each feature in the range {− 1, 1} in
order to improve the stability of the learning process.</p>
        <p>As discussed in Section 3, the proposed model is a neural network composed of two subnets.
The Encoder has four fully-connected dense layers. Three layers have been instantiated with 32,
16, and 8 neurons and equipped with a ReLU (Rectified Linear Unit) activation function. The
fourth layer is the latent space and can be thought as a dense layer (shared between the encoder
and the decoder) including 4 neurons, and it is equipped with a ReLU activation function. The
Decoder is composed again of three fully-connected dense layers with the same dimensions and
activation function. Finally, the output layer is instantiated with the same size of the input, and
equipped with a Tanh activation function. This choice has been made since we want to yield an
output ranging in {− 1, 1}. The model is trained over 16 epochs with a batch size of 16.</p>
        <p>To assess the detection capabilities, we computed the following performance metrics. Let us
define   as the number of positive cases correctly classified,   as the number of negative
cases incorrectly classified as positive,   as the number of positive cases incorrectly classified
as negative, and   as the number of negative cases correctly classified. Then, we considered
the following metrics: the Accuracy, defined as the fraction of cases correctly classified, i.e.,
  + 
  +  + +  , the Precision and the Recall to measure the accuracy in identifying attacks and
   
avoiding false alarms, i.e.,   +  and   +  , respectively. We also considered the F-Measure
to summarize the overall system performances as the harmonic mean of Precision and Recall.</p>
        <p>Lastly, to perform experiments, we used a machine equipped with 32 Gb RAM, an Intel
i7-4790K CPU @4.00GHz and an 1Tb SSD disk drive.</p>
      </sec>
      <sec id="sec-4-3">
        <title>4.3. Numerical Results</title>
        <p>Since the outlierness threshold can influence the detection capability of the proposed approach,
we investigated its impact.
4TensorFlow machine learning library. Available online at: https://www.tensorflow.org/ [Last Accessed: June 2022].</p>
        <p>As the autoencoder model is trained only against legitimate data (i.e., clean trafic produced
by IoT nodes), we computed the outlierness degree for each slot composing the training set.
We then selected as the anomaly threshold the values corresponding to the 90ℎ, 95ℎ and 99ℎ
percentiles. A detailed breakdown is depicted in Figure 5.</p>
        <p>Table 1 reports experimental results obtained by taking into account diferent outlierness
thresholds computed over the training set. As shown, collected values exhibit an intuitive
behavior, i.e., when a more restrictive threshold is selected (99ℎ percentile), the approach
exhibits a good precision (∼ 94%), but a percentage of slots containing a network covert
channel is not correctly recognized. By contrast, a looser threshold value (90ℎ percentile)
allows to improve the probability of detection (∼ 99% of recall), but a higher number of false
alarms are raised. This can be mitigated by considering our mechanism as a first stage of a
more complex detection chain, which can trigger more resource-consuming approaches such as
deep packet inspection. Yet, the best setting is the one where the 95ℎ percentile is used, since it
guarantees the highest value in terms of F-Measure. This represents the best trade of between
probability of detecting the presence of a covert communication and false alarm rate.</p>
        <p>Moreover, Figure 6 portraits the distribution of the outlierness degree for a window including
a marked number of compromised time slots. As it can be seen, the outlierness degree exhibits
higher values than the ones reported in Figure 5. In some cases, the outlierness is one order
of magnitude higher than the outlierness max value computed on the training set. This event
represents the presence of a covert communications within the bulk of trafic, thus leading to a
“deviation” in the output of the neural network.</p>
        <p>Lastly, as regards the feasibility of deploying our approach in realistic settings, we point out
that its resource footprint is very limited. In more detail, gathering information about the TTL
usually accounts for an additional packet delay of ∼ 100 ns when using eBPF and 1 ms with a C
implementation exploiting libpcap over commodity hardware. Instead, apart the training phase,
which can be done ofline, the average prediction time is 0.0132 ms. Another important aspect
concerns the “stateless” nature of the approach. In fact, the used neural architecture performs
the detection of covert communications by using information on the overall trafic (grouped in
time slots), which prevents memory consumption due to the need of storing information with
a per-flow granularity. Thus, the proposed approach should be considered suitable for being
implemented in home gateways often used in production-quality IoT ecosystems.</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>5. Conclusions and Future Work</title>
      <p>In this paper, we presented a lightweight mechanism based on autoencoders for detecting
network covert channels targeting IoT scenarios. Results indicated the efectiveness of our
approach, i.e., the method can achieve the values of ∼ 91% and ∼ 94% for the accuracy and
the precision, respectively. Although our solution addresses a specific case, it can be easily
generalized to handle diferent network covert channels and environments, e.g., by considering
an ensemble of specialized detectors combined to reveal attacks on diferent carriers.</p>
      <p>Future works aim at refining the proposed framework by considering other types of network
covert channels. At the same time, part of our ongoing research is devoted to develop some
form of “intermediate” representations, which can be used to exploit a unique mechanism to
face diferent threats. We are working towards general metrics that could partially compensate
the tight-coupling between the used hiding methodology/protocol and the countermeasure.</p>
    </sec>
    <sec id="sec-6">
      <title>Acknowledgments</title>
      <p>This work has been partially supported by the H2020 Program within the framework of SIMARGL
(Grant Agreement No. 833042), and CyberSec4Europe (Grant Agreement No. 830929).
in mobile networks, in: Proceedings of the 2014 Conference on Internet Measurement
Conference, 2014, pp. 173–180.
[19] G. Hinton, R. Salakhutdinov, Reducing the dimensionality of data with neural networks,</p>
      <p>Science 313 (2006) 504 – 507.
[20] Y. Bengio, L. Pascal, P. Dan, H. Larochelle, Greedy layer-wise training of deep networks,
in: Advances in Neural Information Processing Systems, volume 19, MIT Press, 2007, pp.
153–160.
[21] M. Zuppelli, L. Caviglione, pcapstego: A tool for generating trafic traces for experimenting
with network covert channels, in: The 16th International Conference on Availability,
Reliability and Security, 2021, pp. 1–8.
[22] P. McLaren, G. Russell, B. Buchanan, Mining malware command and control traces, in:
2017 Computing Conference, 2017, pp. 788–794.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>N.</given-names>
            <surname>Neshenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.</given-names>
            <surname>Bou-Harb</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Crichigno</surname>
          </string-name>
          , G. Kaddoum,
          <string-name>
            <given-names>N.</given-names>
            <surname>Ghani</surname>
          </string-name>
          ,
          <article-title>Demystifying IoT security: An exhaustive survey on IoT vulnerabilities and a first empirical look on Internet-scale IoT exploitations</article-title>
          ,
          <source>IEEE Communications Surveys &amp; Tutorials</source>
          <volume>21</volume>
          (
          <year>2019</year>
          )
          <fpage>2702</fpage>
          -
          <lpage>2733</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>M.</given-names>
            <surname>Antonakakis</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>April</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Bailey</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Bernhard</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.</given-names>
            <surname>Bursztein</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Cochran</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z.</given-names>
            <surname>Durumeric</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J. A.</given-names>
            <surname>Halderman</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Invernizzi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Kallitsis</surname>
          </string-name>
          , et al.,
          <article-title>Understanding the Mirai botnet</article-title>
          ,
          <source>in: 26th USENIX security symposium (USENIX Security 17)</source>
          ,
          <year>2017</year>
          , pp.
          <fpage>1093</fpage>
          -
          <lpage>1110</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>A.</given-names>
            <surname>Sivanathan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H. H.</given-names>
            <surname>Gharakheili</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Loi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Radford</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Wijenayake</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Vishwanath</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Sivaraman</surname>
          </string-name>
          ,
          <article-title>Classifying IoT devices in smart environments using network trafic characteristics</article-title>
          ,
          <source>IEEE Transactions on Mobile Computing</source>
          <volume>18</volume>
          (
          <year>2018</year>
          )
          <fpage>1745</fpage>
          -
          <lpage>1759</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>W.</given-names>
            <surname>Mazurczyk</surname>
          </string-name>
          , L. Caviglione, Cyber reconnaissance techniques,
          <source>Communications of the ACM</source>
          <volume>64</volume>
          (
          <year>2021</year>
          )
          <fpage>86</fpage>
          -
          <lpage>95</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>W.</given-names>
            <surname>Mazurczyk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Caviglione</surname>
          </string-name>
          ,
          <article-title>Information hiding as a challenge for malware detection</article-title>
          ,
          <source>IEEE Security Privacy</source>
          <volume>13</volume>
          (
          <year>2015</year>
          )
          <fpage>89</fpage>
          -
          <lpage>93</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>Z.</given-names>
            <surname>Ahmad</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. Shahid</given-names>
            <surname>Khan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Wai Shiang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Abdullah</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Ahmad</surname>
          </string-name>
          ,
          <article-title>Network intrusion detection system: A systematic study of machine learning and deep learning approaches</article-title>
          ,
          <source>Transactions on Emerging Telecommunications Technologies</source>
          <volume>32</volume>
          (
          <year>2021</year>
          )
          <article-title>e4150</article-title>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>S.</given-names>
            <surname>Zander</surname>
          </string-name>
          , G. Armitage,
          <string-name>
            <given-names>P.</given-names>
            <surname>Branch</surname>
          </string-name>
          ,
          <article-title>A survey of covert channels and countermeasures in computer network protocols</article-title>
          ,
          <source>IEEE Communications Surveys &amp; Tutorials</source>
          <volume>9</volume>
          (
          <year>2007</year>
          )
          <fpage>44</fpage>
          -
          <lpage>57</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>S.</given-names>
            <surname>Chen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Lang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Liu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Li</surname>
          </string-name>
          ,
          <string-name>
            <surname>C.</surname>
          </string-name>
          <article-title>Gao, DNS covert channel detection method using the LSTM model</article-title>
          ,
          <source>Computers &amp; Security</source>
          <volume>104</volume>
          (
          <year>2021</year>
          )
          <fpage>102095</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>M.</given-names>
            <surname>Repetto</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Caviglione</surname>
          </string-name>
          ,
          <string-name>
            <surname>M.</surname>
          </string-name>
          <article-title>Zuppelli, bccstego: A framework for investigating network covert channels</article-title>
          ,
          <source>in: The 16th International Conference on Availability, Reliability and Security</source>
          ,
          <year>2021</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>7</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>M. A.</given-names>
            <surname>Elsadig</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Gafar</surname>
          </string-name>
          ,
          <article-title>Covert channel detection: Machine learning approaches</article-title>
          , IEEE Access (
          <year>2022</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>O.</given-names>
            <surname>Darwish</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Al-Fuqaha</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G. B.</given-names>
            <surname>Brahim</surname>
          </string-name>
          ,
          <string-name>
            <surname>I. Jenhani</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Vasilakos</surname>
          </string-name>
          ,
          <article-title>Using hierarchical statistical analysis and deep neural networks to detect covert timing channels</article-title>
          ,
          <source>Applied Soft Computing</source>
          <volume>82</volume>
          (
          <year>2019</year>
          )
          <fpage>105546</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>S.</given-names>
            <surname>Al-Eidi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Darwish</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Chen</surname>
          </string-name>
          , G. Husari,
          <article-title>Snapcatch: automatic detection of covert timing channels using image processing and machine learning</article-title>
          ,
          <source>IEEE Access 9</source>
          (
          <year>2020</year>
          )
          <fpage>177</fpage>
          -
          <lpage>191</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>W.</given-names>
            <surname>Mazurczyk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Wendzel</surname>
          </string-name>
          ,
          <article-title>Information hiding: challenges for forensic experts</article-title>
          ,
          <source>Communications of the ACM</source>
          <volume>61</volume>
          (
          <year>2017</year>
          )
          <fpage>86</fpage>
          -
          <lpage>94</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>C.</given-names>
            <surname>Alcaraz</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.</given-names>
            <surname>Bernieri</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Pascucci</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Lopez</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Setola</surname>
          </string-name>
          ,
          <article-title>Covert channels-based stealth attacks in industry 4.0</article-title>
          ,
          <string-name>
            <surname>IEEE</surname>
          </string-name>
          <source>Systems Journal</source>
          <volume>13</volume>
          (
          <year>2019</year>
          )
          <fpage>3980</fpage>
          -
          <lpage>3988</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>A.</given-names>
            <surname>Velinov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Mileva</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Stojanov</surname>
          </string-name>
          ,
          <article-title>Power consumption analysis of the new covert channels in CoAP</article-title>
          ,
          <source>International Journal On Advances in Security</source>
          <volume>12</volume>
          (
          <year>2019</year>
          )
          <fpage>42</fpage>
          -
          <lpage>52</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>L.</given-names>
            <surname>Caviglione</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Choraś</surname>
          </string-name>
          ,
          <string-name>
            <surname>I. Corona</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Janicki</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W.</given-names>
            <surname>Mazurczyk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Pawlicki</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Wasielewska</surname>
          </string-name>
          ,
          <article-title>Tight arms race: Overview of current malware threats and trends in their detection</article-title>
          ,
          <source>IEEE Access 9</source>
          (
          <year>2020</year>
          )
          <fpage>5371</fpage>
          -
          <lpage>5396</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>S.</given-names>
            <surname>Zander</surname>
          </string-name>
          , G. Armitage,
          <string-name>
            <given-names>P.</given-names>
            <surname>Branch</surname>
          </string-name>
          ,
          <article-title>Covert channels in the IP time to live field</article-title>
          ,
          <source>Swinburne University of Technology Report</source>
          (
          <year>2006</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <surname>Y.-C. Chen</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          <string-name>
            <surname>Liao</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          <string-name>
            <surname>Baldi</surname>
            ,
            <given-names>S.-J.</given-names>
          </string-name>
          <string-name>
            <surname>Lee</surname>
            ,
            <given-names>L. Qiu,</given-names>
          </string-name>
          <article-title>OS fingerprinting and tethering detection</article-title>
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>