Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Daryl Johnson is active.

Publication


Featured researches published by Daryl Johnson.


Proceedings of the 4th International ISKE Conference on Intelligent Systems and Knowledge Engineering | 2009

Behavior-Based covert channel in cyberspace

Daryl Johnson; Peter Lutz; Bo Yuan

Many covert channels take advantages of weaknesses, flaws, or unused data fields in network protocols. In this paper, a behavior-based covert channel, that takes advantages of behavior of an application, is presented along with a formal definition in the framework of finite state machines. The behavior-based covert channel is application specific and lies at the application layer of the network OSI model, which makes the detection of this type of covert channel much more dicult. A detailed sample implementation demonstrates an example of this type of covert channel in the form of a simple online two-person game.The potential of this type of covert channel is also discussed.


security of information and networks | 2011

A HTTP cookie covert channel

William Huba; Bo Yuan; Daryl Johnson; Peter Lutz

This paper presents a new covert channel based on Google Analytic web cookies in HTTP protocol. The new covert channel is difficult to disrupt and is capable of reasonably high bandwidths. The Google Analytic framework is used by over half of the most popular web sites currently on the Internet; its ubiquitousness across the web implies a great impact of this covert.


Proceedings of the 9th International FLINS Conference | 2010

A Covert Channel in RTP Protocol

Christopher Forbes; Bo Yuan; Daryl Johnson; Peter Lutz

A new covert channel over the RTP protocol is designed and implemented by modifying the timestamp value in the RTP header. Due to the high frequency of RTP packets, the covert channel has a high bit-rate, theoretically up to 350 bps. The broad use of RTP for multimedia applications such as VoIP, provides abundant opportunities to such a covert channel to exist. By using the RTP header, many of the challenges present for covert channels using the RTP payload are avoided. A reference implementation of this covert channel is presented. Bit-rates of up to 325 bps were observed. The channel is very difficult to detect due to expected variations in the timestamp field and the flexible nature of RTP.


Archive | 2010

ICMP Covert Channel Resiliency

Kristian Stokes; Bo Yuan; Daryl Johnson; Peter Lutz

The ICMP protocol has been widely used and accepted as a covert channel. While the ICMP protocol is very simple to use, modern security approaches such as Firewalls, deep-packet inspection and intrusion detection systems threaten the use of ICMP for a reliable means for a covert channel. This study explores the modern usefulness of ICMP with typical security measures in place. Existing ICMP covert channel solutions are examined for compliance with standard RFCs and resiliency with modern security approaches.


international conference on computational science | 2016

Covert Channel Using Man-in-the-Middle over HTTPS

Matthew A. Johnson; Peter Lutz; Daryl Johnson

The goal of this covert channel is to prove the feasibility of using encrypted HTTPS traffic to carry a covert channel. The encryption key is not needed because the original HTTPS payload is not decrypted. The covert message will be appended to the HTTPS data field. The receiver will extract the covert channel and restore the original HTTPS traffic for forwarding. Only legitimate HTTPS connections will be used as the overt channel. A Man-in-the-Middle (MITM) attack at the sending and receiving ends will give access to modify the traffic streams. The HTTPS return traffic from the server can carry a covert channel. Without the original HTTPS traffic for comparison or the original encryption keys, this covert channel is undetectable.


2016 IEEE Symposium on Technologies for Homeland Security (HST) | 2016

Producing and evaluating crowdsourced computer security attack trees

Daniel S. Bogaard; Sanjay Goel; Shreshth Kandari; Daryl Johnson; George Markowsky; Bill Stackpole

We describe the recent developments of an open-source project called RATCHET that can be used by groups of users to collectively construct attack trees. We present the RATCHET framework as well as a model for testing and evaluation of the produced attack trees. RATCHET has been tested in classroom settings with positive results and this paper presents the plans for expanding its outreach to the community at large and building attack trees through crowdsourcing. This paper gives an overview of RATCHET and an introduction to its use.


2016 4th International Symposium on Digital Forensic and Security (ISDFS) | 2016

Client-initiated HTTP covert channels using relays

Gregory Daneault; Daryl Johnson

This paper proposes a new covert channel utilizing open web relays. While the channel described is very straightforward, the addition of a trusted relay dramatically increases the anonymity and efficacy of this channel. Indirect, relayed communications disguise the actual endpoints of the communication making analysis, detection, and prevention more difficult.


intelligent data acquisition and advanced computing systems technology and applications | 2015

Exploring a high-capacity covert channel on the Android operating system

Timothy Heard; Daryl Johnson; Bill Stackpole

As the use and prevalence of mobile technology increases so too does the importance of effective security for these devices. In particular, sensitive user information must be protected, which includes protecting against any covert channels that would allow such information to be compromised. This paper will examine a new covert channel capable of circumventing existing application-level protections on the Android operating system (OS). The authors will also show that this channel is capable of achieving significantly higher throughput than similar, previously discovered channels, which necessitates the implementation of additional security protections and controls at the operating system level.


hawaii international conference on system sciences | 2011

Third Party Application Forensics on Apple Mobile Devices

Alex Levinson; Bill Stackpole; Daryl Johnson


Archive | 2010

Covert channels in the HTTP network protocol: Channel characterization and detecting man-in-the-middle attacks

Daryl Johnson; Bo Yuan; Peter Lutz; Erik Brown

Collaboration


Dive into the Daryl Johnson's collaboration.

Top Co-Authors

Avatar

Peter Lutz

Rochester Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Bo Yuan

Rochester Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Bill Stackpole

Rochester Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Bruce Hartpence

Rochester Institute of Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Daniel S. Bogaard

Rochester Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Kuhu Sharma

Rochester Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Nirmala Shenoy

Rochester Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Shreshth Kandari

Rochester Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Timothy Heard

Rochester Institute of Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge