Abstract
In this paper an entropy-based approach for detecting the covert timing channels is proposed. The detection of covert timing channels is the challenging task over the internet. Ordinary things such as existence of a file or time used for computation, have been the medium through which covert channel communicates. Covert timing channels are not easy to detect because these media are so numerous and frequently used. Different approaches are implemented to detect various covert timing channels. Existing techniques are efficient but have to adopt more than one approach. Applying more than one approach to detect the covert timing channels is the risk process. In this paper, only one approach is used by this efficiency is improved while applying this proposed technique improvements to be made for proposed entropy and corrected conditional entropy in detecting covert timing channels. An entropy-based approach is sensitive to the current covert timing channels.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Cabuk, S.: Network Covert Channels: Design, Analysis, Detection and Elimination. Purdue Uni. (December 2006)
Cabuk, S., Brodley, C., Shields, C.: IP Covert Timing Channels: Design and Detection. In: Proc. ACM Conf. Computer and Common. Security (October 2004)
Shah, G.: Keyboards and Covert Channels. In: Proc. USENIX Security Symp. (July/August 2006)
Cloak: A Ten-Fold Way for Reliable Covert Communication. In: Luo, X. (ed.) Proc. European Symp. Research in Computer Security (September 2007)
Porta, Baselli, Liberati: Measuring Regularity by Means of a Corrected Conditional Entropy in Sympathetic Outflow. Biological Cybernetics (January 1998)
Arimoto, S.: An Algorithm for Computing the capacity of Arbitrary Discrete Memory less Channels. Proc. IEEE Trans. Information Theory (January 1972)
Blahut, R.E.: Computation of Channel Capacity and Rate-Distortion Functions. IEEE Trans. Information Theory (July 1972)
Luo, X., Chan, E.W.W., Chang, R.K.C.: TCP Covert Timing Channels: Design and Detection. In: Proc. IEEE Int’l Conf. Dependable Systems and Networks (June 2008)
Henry, P.A.: Covert channels provided hackers the opportunity and the means for the current distributed denial of service attacks. Technical report (2000)
Wang, X., Chen, S., Jajodia, S.: Tracking Anonymous Peer-to-Peer VoIP Calls on the Internet. In: Proc. ACM Conf. Computer and Comm. Security (November 2005)
Peng, P., Ning, P., Reeves, D.: On the Secrecy of Timing-Based Active Watermarking Trace-Back Techniques. In: Proc. IEEE Symp. Security and Privacy (May 2006)
Moddemeijer, R.: On Estimation of Entropy and Mutual Information of Continuous Distributions. Signal Processing (1989)
Huskamp, J.C.: Covert communication channels in timesharing systems, Ph.D. thesis. Univ. of Califomia, Berkeley, CA (1978); also tech. rep. UCB-CS-78-02 and Electron. Res. Lab. Memo. No. ERLM78/ 37
Ogurtsov, N., Orman, H., Schroeppel, R., O’Malley, S., Spatscheck, O.: Experimental Results of Covert Channel Limitation in One-way Communication Systems. Department of Computer Science University of Arizona Tucson, AZ 85721, nicko,ho,rcs,sean,spatsch @cs.arizona.edu
Ogurtsov, N., Orman, H., Schroeppel, R., O’Malley, S., Spatscheck, O.: Experimental Results of Covert Channel Limitation in One-way Communication Systems Department of Computer Science University of Arizona Tucson, AZ 85721 nicko,ho,rcs,sean,spatsch @cs.arizona.edu
A guide to understand covert channels analysis of trusted systems. Virgil Gligor. Technical Report NCSC_TG_030, National Computer Security Center, Ft. George G.Meade, Maryland, U.S.A (November 1993)
Shah, G.: Keywords and Covert Channels. Andres Molina and Matt blaze. University of Pennsylvania
Gianvechio, S., Wang, H.: An Entropy-Based Approach to Detect Covert Timing Channels. IEEE Trans. Dependable and Secure Computing 8(6) (November 2011)
Berk, V., Giani, A., Cybenko, G.: Detection of Covert Channel Encoding in Network Packet Delays. Dept. of Comp. Sci. (November 2005)
Liua, Y., Ghosal, D., Katzenbeisser, S.: Hide and Seek in Time- Robust Covert Timing Channels. Dept. of Electrical and Comp. Sci., University of California, Davis, USA
Padlipsky, M., Snow, D., Karger, P.: Limitations of end-to-end encryption in secure computer networks. Tech. Rep. ESD TR-78-158, Mitre Corporation (1978)
Lampson, B.W.: A note on the confinement problem. Proc. of the Communications of the ACM (16), 10 (1973)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Naik, B.D., Boddukolu, S.C., Sujatha, P., Dhavachelvan, P. (2012). Connecting Entropy-Based Detection Methods and Entropy to Detect Covert Timing Channels. In: Meghanathan, N., Nagamalai, D., Chaki, N. (eds) Advances in Computing and Information Technology. Advances in Intelligent Systems and Computing, vol 176. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-31513-8_29
Download citation
DOI: https://doi.org/10.1007/978-3-642-31513-8_29
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-31512-1
Online ISBN: 978-3-642-31513-8
eBook Packages: EngineeringEngineering (R0)