A comparative analysis of detection metrics for covert timing channels

被引:34
作者
Archibald, Rennie [1 ]
Ghosar, Dipak [1 ]
机构
[1] Univ Calif Davis, Dept Comp Sci, Davis, CA 95616 USA
关键词
Covert timing channels; Detection; Welch's t-test; Corrected conditional entropy; Regularity test; Shape test; Entropy test;
D O I
10.1016/j.cose.2014.03.007
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Methods to detect covert timing channels (CTCs) can be categorized into three broad classes: shape tests which include the Kolmogorov-Smirnov (KS) test, entropy tests which include first order entropy test, corrected conditional entropy (CCE) test, and Kullback-Leibler (KL) divergence test, and regularity tests. This paper contributes towards understanding and advancing the state-of-the-art of CTC detection methods. First, we present a detailed analysis of the performance of the well-known tests that are used to detect three main types of CTCs, namely, Jitter Bug, model-based CTC (MB-CTC) and time-replay CTC (TR-CTC). The performance analysis is carried out in an enterprise-like setting, employing large traffic traces. The detection methods are compared with respect to their applicability, computational complexity, and the classification rates for the three types of CTCs. In addition to evaluating the existing methods, we propose a new shape test based on the Welch's t-test and compare its performance with existing detection methods. We show that the classification rate of Welch's t-test is at least at par with other existing detection methods while having a relatively lower computational cost. The results also show that the Welch's t-test outperforms the CCE test in detecting Jitter Bug, while the CCE test has a better performance in detecting the TR-CTC. Furthermore, both tests perform comparably on the MB-CTC. Finally, we study the feasibility of using a multi-feature SVM classifier to increase the classification rate. We show that by combining the Welch's t-test we are able to increase the classification rate of MB-CTCs from 0.67 (using a single regularity measure) to 0.94. (C) 2014 Elsevier Ltd. All rights reserved.
引用
收藏
页码:284 / 292
页数:9
相关论文
共 21 条
[1]   Libtrace: A Packet Capture and Analysis Library [J].
Alcock, Shane ;
Lorier, Perry ;
Nelson, Richard .
ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2012, 42 (02) :43-48
[2]  
[Anonymous], P 21 ANN COMP SEC AP
[3]  
[Anonymous], 2006, THESIS
[4]  
Archibald R., 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), P970, DOI 10.1109/TrustCom.2012.21
[5]  
Cabuk S., 2004, P 11 ACM C COMP COMM, P178, DOI DOI 10.1145/1030083.1030108
[6]  
Coleman T., 2008, IEEE INF THEOR WORKS
[7]   An Entropy-Based Approach to Detecting Covert Timing Channels [J].
Gianvecchio, Steven ;
Wang, Haining .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2011, 8 (06) :785-797
[8]  
Houmansadr Amir, 2011, Information Hiding. 13th International Conference, IH 2011. Revised Selected Papers, P314, DOI 10.1007/978-3-642-24178-9_22
[9]  
KANG MH, 1993, P 1 ACM C COMP COMM, P119, DOI DOI 10.1145/168588.168604
[10]  
Kiayias A, 2012, P 14 INT C INF HID I