Abstract
Covert channels aim to hide the existence of communication. Recently proposed packet-timing channels encode covert data in inter-packet times, based on models of inter-packet times of normal traffic. These channels are detectable if normal inter-packet times are not independent identically-distributed, which we demonstrate is the case for several network applications. We show that ~80% of channels are detected with a false positive rate of 0.5%. We then propose an improved channel that is much harder to detect. Only ~9% of our new channels are detected at a false positive rate of 0.5%. Our new channel uses packet content for synchronisation and works with UDP and TCP traffic. The channel capacity reaches over hundred bits per second depending on overt traffic and network jitter.
Chapter PDF
References
Zander, S., Armitage, G., Branch, P.: A Survey of Covert Channels and Countermeasures in Computer Network Protocols. IEEE Communications Surveys and Tutorials 9(3), 44–57 (2007)
Gianvecchio, S., Wang, H., Wijesekera, D., Jajodia, S.: Model-based covert timing channels: Automated modeling and evasion. In: Lippmann, R., Kirda, E., Trachtenberg, A. (eds.) RAID 2008. LNCS, vol. 5230, pp. 211–230. Springer, Heidelberg (2008)
Sellke, S.H., Wang, C.-C., Bagchi, S., Shroff, N.B.: Covert TCP/IP Timing Channels: Theory to Implementation. In: Conference on Computer Communications (INFOCOM) (April 2009)
Paxson, V.: End-to-end Internet Packet Dynamics. IEEE/ACM Transactions on Networking 7(3), 277–292 (1999)
Padlipsky, M.A., Snow, D.W., Karger, P.A.: Limitations of End-to-End Encryption in Secure Computer Networks. Technical Report ESD-TR-78-158, Mitre Corporation (August 1978)
Berk, V., Giani, A., Cybenko, G.: Detection of Covert Channel Encoding in Network Packet Delays. Technical Report TR2005-536, Dartmouth College (November 2005)
Shah, G., Molina, A., Blaze, M.: Keyboards and Covert Channels. In: USENIX Security (August 2006)
Gianvecchio, S., Wang, H.: Detecting Covert Timing Channels: An Entropy-Based Approach. In: ACM Conference on Computer and Communication Security (CCS) (November 2007)
Luo, X., Chan, E.W.W., Chang, R.K.C.: TCP Covert Timing Channels: Design and Detection. In: IEEE/IFIP Conference on Dependable Systems and Networks (DSN) (June 2008)
Liu, Y., Ghosal, D., Armknecht, F., Sadeghi, A.-R., Schulz, S., Katzenbeisser, S.: Hide and Seek in Time — Robust Covert Timing Channels. In: Backes, M., Ning, P. (eds.) ESORICS 2009. LNCS, vol. 5789, pp. 120–135. Springer, Heidelberg (2009)
Quake, http://www.idsoftware.com
Branch, P., Heyde, A., Armitage, G.: Rapid Identification of Skype Traffic. In: ACM Network and Operating System Support for Digital Audio and Video (NOSSDAV) (June 2009)
M2C Measurement Data Repository (December 2003), http://traces.simpleweb.org/
Henke, C., Schmoll, C., Zseby, T.: Empirical Evaluation of Hash Functions for PacketID Generation in Sampled Multipoint Measurements. In: Moon, S.B., Teixeira, R., Uhlig, S. (eds.) PAM 2009. LNCS, vol. 5448, pp. 197–206. Springer, Heidelberg (2009)
Williams, N., Zander, S., Armitage, G.: A Preliminary Performance Comparison of Five Machine Learning Algorithms for Practical IP Traffic Flow Classification. SIGCOMM Computer Communication Review 36(5) (October 2006)
Kohavi, R., Quinlan, J.R.: Decision-tree Discovery, ch. 16.1.3, pp. 267–276. Oxford University Press, Oxford (2002)
Witten, I.H., Frank, E.: Data Mining: Practical Machine Learning Tools and Techniques, 2nd edn. Morgan Kaufmann, San Francisco (2005)
Cover, T.M., Thomas, J.A.: Elements of Information Theory. Wiley Series in Telecommunications. John Wiley & Sons, Chichester (1991)
Zander, S.: CCHEF - Covert Channels Evaluation Framework (2007), http://caia.swin.edu.au/cv/szander/cc/cchef/
Linux Foundation. Netem (2008), http://www.linuxfoundation.org/en/Net:Netem
Rizo, L., Torres, D., Dehesa, J., Muñoz, D.: Cauchy Distribution for Jitter in IP Networks. In: International Conference on Electronics, Communications and Computers, pp. 35–40 (2008)
Demichelis, C., Chimento, P.: IP Packet Delay Variation Metric for IP Performance Metrics (IPPM). RFC 3393, IETF (November 2002), http://www.ietf.org/rfc/rfc3393.txt
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 IFIP International Federation for Information Processing
About this paper
Cite this paper
Zander, S., Armitage, G., Branch, P. (2011). Stealthier Inter-packet Timing Covert Channels. In: Domingo-Pascual, J., Manzoni, P., Palazzo, S., Pont, A., Scoglio, C. (eds) NETWORKING 2011. NETWORKING 2011. Lecture Notes in Computer Science, vol 6640. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-20757-0_36
Download citation
DOI: https://doi.org/10.1007/978-3-642-20757-0_36
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-20756-3
Online ISBN: 978-3-642-20757-0
eBook Packages: Computer ScienceComputer Science (R0)