Implementing a passive network covert timing channel

被引:6
作者
Zi, Xiaochao [1 ,2 ]
Yao, Lihong [1 ,2 ]
Pan, Li [1 ]
Li, Jianhua [1 ]
机构
[1] Shanghai Jiao Tong Univ, Sch Informat Secur Eng, Shanghai 200240, Peoples R China
[2] Nanjing Univ, State Key Lab Novel Software Technol, Nanjing 210093, Peoples R China
基金
中国国家自然科学基金;
关键词
Network security; Network covert channel; Passive covert timing channel; VOD traffic; Frame synchronization; Error correction;
D O I
10.1016/j.cose.2009.12.010
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The paper concerns passive network covert timing channels, in which the channel senders reside in intermediate nodes (e.g. router, gateway) and forward the passing-by packets in a carefully planned manner to covertly transmit the information. In this study, we focus on constructing and testing a kind of passive network covert timing channel, in which the information is hidden in the transmission interval between two adjacent packets. We first introduce three channel states to cope with the fluctuation in the traffic used as carrier, and explore how to select suitable values for the channel parameters to obtain high communication performance. We then implement an actual channel using Video On Demand (VOD) traffic as carrier, and obtain the communication characteristics of the channel. Finally, we investigate an information transmission scheme over the channel, including frame design, frame synchronization and error correction. (C) 2009 Elsevier Ltd. All rights reserved.
引用
收藏
页码:686 / 696
页数:11
相关论文
共 32 条
[1]  
ABAD C, 2001, CHECKSUM COVERT CHAN
[2]  
BERK V, 2005, TR536 DARTHM COLL
[3]   Communication Through Jamming Over a Slotted ALOHA Channel [J].
Bhadra, Sandeep ;
Bodas, Shreeshankar ;
Shakkottai, Sanjay ;
Vishwanath, Sriram .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2008, 54 (11) :5257-5262
[4]  
BUCHANAN WJ, 2004, P 3 EUR C INF WARF S
[5]  
Cabuk S., 2004, P 11 ACM C COMP COMM, P178, DOI DOI 10.1145/1030083.1030108
[6]  
Cabuk S., 2006, Network Covert Channels: Design, Analysis, Detection, and Elimination
[7]  
CABUK S, 1922, ACM T INFORM SYSTEMS, V12, P22
[8]  
Chakinala R., 2006, International Workshop on Information Hiding, P42
[9]  
Fisk G, 2003, LECT NOTES COMPUT SC, V2578, P18
[10]  
Gianvecchio S, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P307