Wireless intrusion detection of covert channel attacks in ITU-T G.9959-based networks

Jonathan Fuller, Benjamin Ramsey, John Pecarina, Mason Rice

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

3 Scopus citations

Abstract

We introduce herein an information hiding technique for injecting manipulated packets into wireless sensor networks (WSNs). We exhibit how an attacker can apply information hiding as a type of covert channel attack over radio frequency transmissions into the WSN. The feasibility of our injection method is demonstrated through an attack on the most common implementation of the ITU-T G.9959 recommendation, commercially known as Z-Wave. More specifically, we illustrate that after accessing a Z-Wave gateway controller through compromising the WLAN backbone, the attacker has the ability to install malware. The malware scans incoming Z-Wave packets for information hidden in Media Access Control (MAC) frames received by the Z-Wave controller. Upon identification of hidden information, a Reverse Secure Shell is initiated through the WLAN back to the attacker. The outcomes of this attack include control of the Z-Wave network and access to the networked devices on the target WLAN from any Internet connected device. Given this new application of information hiding techniques to Z-Wave networks, we recognize the need for countermeasures. We therefore offer an effective Misuse-based Intrusion Detection System (MBIDS) capable of distinguishing between manipulated and correctly formed packets. A Universal Software Radio Peripheral (USRP) Software-Defined Radio (SDR) is used in conjunction with a packet monitoring tool capturing incoming transmissions and inspecting them for any violations of the ITU-T G.9959 MAC specification. We then analytically and experimentally estimate the efficacy of the USRP as a packet capture device in a realistic test setup, and then evaluate the total efficiency of our MBIDS solution. By employing the MBIDS in the Z-Wave network, we show the MBIDS is capable of detecting packet manipulation attacks with 92% mean accuracy.

Original languageEnglish
Title of host publicationProceedings of the 11th International Conference on Cyber Warfare and Security, ICCWS 2016
EditorsTanya Zlateva, Virginia A. Greiman
PublisherAcademic Conferences Limited
Pages137-145
Number of pages9
ISBN (Electronic)9781910810828
StatePublished - 2016
Externally publishedYes
Event11th International Conference on Cyber Warfare and Security, ICCWS 2016 - Boston, United States
Duration: Mar 17 2016Mar 18 2016

Publication series

NameProceedings of the 11th International Conference on Cyber Warfare and Security, ICCWS 2016

Conference

Conference11th International Conference on Cyber Warfare and Security, ICCWS 2016
Country/TerritoryUnited States
CityBoston
Period03/17/1603/18/16

Keywords

  • Covert channel
  • Intrusion detection
  • Wireless sensor networks
  • Wireless threats
  • Z-Wave

Fingerprint

Dive into the research topics of 'Wireless intrusion detection of covert channel attacks in ITU-T G.9959-based networks'. Together they form a unique fingerprint.

Cite this