A payload-dependent packet rearranging covert channel for mobile VoIP traffic

被引:40
作者
Liang, Chen [1 ]
Wang, Xianmin [2 ]
Zhang, Xiaosong [1 ]
Zhang, Yu [3 ,4 ,5 ]
Sharif, Kashif [1 ]
Tan, Yu-an [1 ]
机构
[1] Beijing Inst Technol, Sch Comp Sci & Technol, Beijing 100081, Peoples R China
[2] Guangzhou Univ, Sch Comp Sci, Guangzhou 510006, Guangdong, Peoples R China
[3] Beijing Univ Civil Engn & Architecture, Sch Elect & Informat Engn, Beijing 100044, Peoples R China
[4] Beijing Univ Civil Engn & Architecture, Beijing Key Lab Intelligent Proc Bldg Big Data, Beijing 100044, Peoples R China
[5] China Univ Min & Technol, State Key Lab China GeoMech & Deep Underground En, Beijing 100083, Peoples R China
基金
中国国家自然科学基金; 国家重点研发计划;
关键词
Covert channel; Mobile VoIP; Packet rearranging; UDP traffics; CONVOLUTIONAL NEURAL-NETWORK; TIMING CHANNELS; SECURE; EFFICIENT;
D O I
10.1016/j.ins.2018.07.011
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
VoIP (Voice over Internet Protocol) is one of the most prevalent services for the mobile users. An enormous amount of audio and video data is transmitted over VoIP communication continuously, to make it potentially available for stealth message transfer. The existing covert channel schemes focus on modifying packet payload or inter-packet delays, the former kind is easy to be detected since a minor modification may lead to distinct abnormalities, while the latter is too sensitive to network jitter due to its short inter-packet delays. Hence, to effectively construct covert channel becomes a challenge, and requires investigation in using mobile VoIP traffic for robust and stealthy covert communication. In this paper, we propose a covert channel scheme which communicates by rearranging the packet sending sequences while keeps the undetectability and robustness. Unlike the existed packet rearranging covert channels which may concentrate on packet rearranging according to the existed packet features such as packet id and packet length, the proposed scheme focuses on building packet rearranging covert channel whose function is regardless of the variation on legitimate traffic. According to the hash value of the payload, the packets are classified into delimiter packets and carrier packets, and the covert message is embedded onto a number of carrier packets (NoCP) between the relative delimiter packets. Moreover, to mitigate the interference from channel noise, the differences between two correlative NoCPs are utilized as the codewords by redundantly partitioning their values into 1-bit symbols. The channel parameters are adjustable to trade off between the efficiency and security. The corresponding experiments are conducted over three kinds of typical mobile VoIP traffics to evaluate the undetectability, robustness and throughput of our scheme. Results of the BER (bit error rate) and KS (Kolmogorov-Smirnov) test show that the scheme is robust and stealthy. (C) 2018 Elsevier Inc. All rights reserved.
引用
收藏
页码:162 / 173
页数:12
相关论文
共 49 条
  • [21] Achieving Efficient and Secure Data Acquisition for Cloud-Supported Internet of Things in Smart Grid
    Guan, Zhitao
    Li, Jing
    Wu, Longfei
    Zhang, Yue
    Wu, Jun
    Du, Xiaojiang
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2017, 4 (06): : 1934 - 1944
  • [22] Insight of the protection for data security under selective opening attacks
    Huang, Zhengan
    Liu, Shengli
    Mao, Xianping
    Chen, Kefei
    Li, Jin
    [J]. INFORMATION SCIENCES, 2017, 412 : 223 - 241
  • [23] Significant Permission Identification for Machine-Learning-Based Android Malware Detection
    Li, Jin
    Sun, Lichao
    Yan, Qiben
    Li, Zhiqiang
    Srisa-an, Witawas
    Ye, Heng
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2018, 14 (07) : 3216 - 3225
  • [24] Secure Auditing and Deduplicating Data in Cloud
    Li, Jingwei
    Li, Jin
    Xie, Dongqing
    Cai, Zhang
    [J]. IEEE TRANSACTIONS ON COMPUTERS, 2016, 65 (08) : 2386 - 2396
  • [25] Privacy-preserving outsourced classification in cloud computing
    Li, Ping
    Li, Jin
    Huang, Zhengan
    Gao, Chong-Zhi
    Chen, Wen-Bin
    Chen, Kai
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2018, 21 (01): : 277 - 286
  • [26] Distance metric optimization driven convolutional neural network for age invariant face recognition
    Li, Ya
    Wang, Guangrun
    Nie, Lin
    Wang, Qing
    Tan, Wenwei
    [J]. PATTERN RECOGNITION, 2018, 75 : 51 - 62
  • [27] Lihua Zhang, 2014, Journal of Networks, V9, P1440, DOI 10.4304/jnw.9.6.1440-1446
  • [28] An ID-Based Linearly Homomorphic Signature Scheme and Its Application in Blockchain
    Lin, Qun
    Yan, Hongyang
    Huang, Zhengan
    Chen, Wenbin
    Shen, Jian
    Tang, Yi
    [J]. IEEE ACCESS, 2018, 6 : 20632 - 20640
  • [29] Novel Packet Size-Based Covert Channel Attacks against Anonymizer
    Ling, Zhen
    Fu, Xinwen
    Jia, Weijia
    Yu, Wei
    Xuan, Dong
    Luo, Junzhou
    [J]. IEEE TRANSACTIONS ON COMPUTERS, 2013, 62 (12) : 2411 - 2426
  • [30] DivORAM: Towards a practical oblivious RAM with variable block size
    Liu, Zheli
    Huang, Yanyu
    Li, Jin
    Cheng, Xiaochun
    Shen, Chao
    [J]. INFORMATION SCIENCES, 2018, 447 : 1 - 11