The Intrusion Detection and Prevention System (IDPS) services of a North American cloud service provider were ineffective against a simulated network timing channel attack. During the tests, three conspiring white hat agents exchanged a total of 33,024 network packets. As the proxy based attack executed, the vendor's intrusion detection service did not generate a warning, nor did its intrusion prevention service drop packets. Throughout the experiment, 4,096 bytes of randomized data (simulating covert traffic) were exchanged over a 2.06 hour period (4.4 bits-per-second); however, the vendor's Artificial Intelligence (AI) enabled threat detection service did not issue an alert. A Wilcoxon Ranked Sum test on the before-And-After throughput confirmed none of the vendor's countermeasures triggered/intervened to a statistically significant degree (threat intel: p=0.703 { IDPS: } p=0.998, threat intel + { IDPS: } p=0.118 ). These results indicate those accountable for data-oriented Service Organization Control (SOC) 2/3 reports (e.g., auditors, cybersecurity executives, etc.) should carefully examine the assurances offered by cloud service providers with regard to their network steganography defenses.
CITATION STYLE
Flowers, R. (2022). A Zero-Day Cloud Timing Channel Attack. IEEE Access, 10, 128177–128186. https://doi.org/10.1109/ACCESS.2022.3227420
Mendeley helps you to discover research relevant for your work.