Covert Timing Channel Analysis Either as Cyber Attacks or Confidential Applications
Abstract
:1. Introduction
- Analyze the behavior of covert traffic and legitimate traffic in two different networks using statistical metrics to explore how the inter-arrival times of legitimate traffic can be used effectively to transmit the covert traffic between two entities communicating over networks, and how the network conditions can affect the behavior of both traffics.
- Find the threshold for delaying packet that makes the covert channel efficient to leak information. This threshold is really important to answer the following questions in different scenarios:
- -
- Scenario 1 (Covert timing channel as a cyber-attack such as leaking information between two devices)
Does this covert timing channel really dangerous and need to be mitigated or detected?- -
- Scenario 2 (Covert timing channel as confidential applications such as sending secret data in military mission)
Does this covert timing channel reliable to send data?
2. Related Work
2.1. Covert Timing Channel Design Approaches
2.2. Covert Timing Channels Detection Approaches
3. Methodology
3.1. Experimental Design
Experimental Configuration Setup
3.2. Covert Timing Channel Sender
3.3. Covert Timing Channel Receiver
- Source IP address
- Destination IP address
- Source port
- Destination port
- Protocol
4. Accuracy and Transmission Bit Rate Analysis
4.1. Accuracy of Distinguishing Covert Traffic from Legitimate Traffic
4.2. Transmission Bit Rate
5. Conclusions and Future Works
Author Contributions
Funding
Conflicts of Interest
References
- Denney, K.; Uluagac, A.S.; Akkaya, K.; Bhansali, S. A novel storage covert channel on wearable devices using status bar notifications. In Proceedings of the 2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC), Las Vegas, NV, USA, 9–12 January 2016; pp. 845–848. [Google Scholar]
- Kiyavash, N.; Koushanfar, F.; Coleman, T.P.; Rodrigues, M. A timing channel spyware for the CSMA/CA protocol. IEEE Trans. Inf. Forensics Secur. 2013, 8, 477–487. [Google Scholar] [CrossRef] [Green Version]
- Mileva, A.; Velinov, A.; Stojanov, D. New Covert Channels in Internet of Things. In Proceedings of the 12th International Conference on Emerging Security Information, Systems and Technologies (SECURWARE), Venice, Italy, 16–20 September 2018; pp. 30–36. [Google Scholar]
- Venčkauskas, A.; Morkevicius, N.; Bagdonas, K.; Damaševičius, R.; Maskeliūnas, R. A lightweight protocol for secure video streaming. Sensors 2018, 18, 1554. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Tan, Y.a.; Zhang, X.; Sharif, K.; Liang, C.; Zhang, Q.; Li, Y. Covert timing channels for IoT over mobile networks. IEEE Wirel. Commun. 2018, 25, 38–44. [Google Scholar] [CrossRef]
- Islam, M.N.; Patil, V.C.; Kundu, S. Determining proximal geolocation of IoT edge devices via covert channel. In Proceedings of the 2017 18th International Symposium on Quality Electronic Design (ISQED), Santa Clara, CA, USA, 14–15 March 2017; pp. 196–202. [Google Scholar]
- Girling, C.G. Covert Channels in LAN’s. IEEE Trans. Softw. Eng. 1987, 13, 292. [Google Scholar] [CrossRef]
- Padlipsky, M.; Snow, D.; Karger, P. Limitations of End-to-End Encryption in Secure Computer Networks; Technical Report; Mitre Corp.: Bedford, MA, USA, 1978. [Google Scholar]
- Cabuk, S.; Brodley, C.E.; Shields, C. IP covert timing channels: Design and detection. In Proceedings of the 11th ACM Conference on Computer And Communications Security, Washington, DC, USA, 25–29 October 2004; pp. 178–187. [Google Scholar]
- Yao, L.; Zi, X.; Pan, L.; Li, J. A study of on/off timing channel based on packet delay distribution. Comput. Secur. 2009, 28, 785–794. [Google Scholar] [CrossRef]
- Berk, V.; Giani, A.; Cybenko, G.; Hanover, N. Detection of covert channel encoding in network packet delays. In Rapport Technique TR536; de lUniversité de Dartmouth: Hanover, NH, USA, 2005; Volume 19. [Google Scholar]
- Wolf, M. Covert channels in LAN protocols. In Local Area Network Security Workshop; Springer: Berlin, Germany, 1989; pp. 89–101. [Google Scholar]
- Cabuk, S. Network Covert Channels: Design, Analysis, Detection, and Elimination. Ph.D. Thesis, Purdue University, City of West Lafayette, IN, USA, 2006. [Google Scholar]
- Gianvecchio, S.; Wang, H.; Wijesekera, D.; Jajodia, S. Model-based covert timing channels: Automated modeling and evasion. In International Workshop on Recent Advances in Intrusion Detection; Springer: Berlin, Germany, 2008; pp. 211–230. [Google Scholar]
- Shah, G.; Molina, A.; Blaze, M. Keyboards and Covert Channels. In Proceedings of the 15th Conference on USENIX Security Symposium; USENIX Association: Vancouver, BC, Canada, 2006. [Google Scholar]
- Sellke, S.H.; Wang, C.C.; Bagchi, S.; Shroff, N. TCP/IP timing channels: Theory to implementation. In Proceedings of the IEEE INFOCOM 2009, Rio de Janeiro, Brazil, 19–25 April 2009; pp. 2204–2212. [Google Scholar]
- Jaber, M.; Cascella, R.G.; Barakat, C. Can we trust the inter-packet time for traffic classification? In Proceedings of the 2011 IEEE International Conference on Communications (ICC), Kyoto, Japan, 5–9 June 2011; pp. 1–5. [Google Scholar]
- Zhang, X.; Tan, Y.A.; Liang, C.; Li, Y.; Li, J. A covert channel over volte via adjusting silence periods. IEEE Access 2018, 6, 9292–9302. [Google Scholar] [CrossRef]
- Chen, P.; Xie, Z.; Fang, Y.; Chen, Z.; Mumtaz, S.; Rodrigues, J.J. Physical-layer network coding: An efficient technique for wireless communications. IEEE Netw. 2019, 34, 270–276. [Google Scholar] [CrossRef] [Green Version]
- Ghassami, A.; Kiyavash, N. A covert queueing channel in fcfs schedulers. IEEE Trans. Inf. Forensics Secur. 2018, 13, 1551–1563. [Google Scholar] [CrossRef] [Green Version]
- Qu, H.; Su, P.; Feng, D. A typical noisy covert channel in the IP protocol. In Proceedings of the 38th Annual 2004 International Carnahan Conference on Security Technology, Albuquerque, NM, USA, 11–14 October 2004; pp. 189–192. [Google Scholar]
- Lucena, N.B.; Lewandowski, G.; Chapin, S.J. Covert channels in IPv6. In International Workshop on Privacy Enhancing Technologies; Springer: Berlin, Germany, 2005; pp. 147–166. [Google Scholar]
- Zander, S.; Armitage, G.; Branch, P. A survey of covert channels and countermeasures in computer network protocols. IEEE Commun. Surv. Tutor. 2007, 9, 44–57. [Google Scholar] [CrossRef]
- Liu, Y.; Ghosal, D.; Armknecht, F.; Sadeghi, A.R.; Schulz, S.; Katzenbeisser, S. Robust and undetectable steganographic timing channels for iid traffic. In International Workshop on Information Hiding; Springer: Berlin, Germany, 2010; pp. 193–207. [Google Scholar]
- Porta, A.; Baselli, G.; Liberati, D.; Montano, N.; Cogliati, C.; Gnecchi-Ruscone, T.; Malliani, A.; Cerutti, S. Measuring regularity by means of a corrected conditional entropy in sympathetic outflow. Biol. Cybern. 1998, 78, 71–78. [Google Scholar] [CrossRef] [PubMed]
- Gianvecchio, S.; Wang, H. An entropy-based approach to detecting covert timing channels. IEEE Trans. Dependable Secur. Comput. 2010, 8, 785–797. [Google Scholar] [CrossRef]
- Darwish, O.; Al-Fuqaha, A.; Anan, M.; Nasser, N. The role of hierarchical entropy analysis in the detection and time-scale determination of covert timing channels. In Proceedings of the 2015 International Wireless Communications and Mobile Computing Conference (IWCMC), Dubrovnik, Croatia, 24–28 August 2015; pp. 153–159. [Google Scholar]
- Darwish, O.; Al-Fuqaha, A.; Brahim, G.B.; Javed, M.A. Using MapReduce and hierarchical entropy analysis to speed-up the detection of covert timing channels. In Proceedings of the 2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC), Valencia, Spain, 26–30 June 2017; pp. 1102–1107. [Google Scholar]
- Shrestha, P.L.; Hempel, M.; Rezaei, F.; Sharif, H. A support vector machine-based framework for detection of covert timing channels. IEEE Trans. Dependable Secur. Comput. 2015, 13, 274–283. [Google Scholar] [CrossRef]
- Zander, S.; Armitage, G.; Branch, P. Stealthier inter-packet timing covert channels. In International Conference on Research in Networking; Springer: Berlin, Germany, 2011; pp. 458–470. [Google Scholar]
- Iglesias, F.; Zseby, T. Are network covert timing channels statistical anomalies? In Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, 29 August–1 September 2017; pp. 1–9. [Google Scholar]
- Vázquez, F.I.; Annessi, R.; Zseby, T. Analytic Study of Features for the Detection of Covert Timing Channels in NetworkTraffic. J. Cyber Secur. Mobil. 2017, 6, 225–270. [Google Scholar] [CrossRef] [Green Version]
- Darwish, O.; Al-Fuqaha, A.; Brahim, G.B.; Jenhani, I.; Vasilakos, A. Using hierarchical statistical analysis and deep neural networks to detect covert timing channels. Appl. Soft Comput. 2019, 82, 105546. [Google Scholar] [CrossRef]
- Esfahanizadeh, H.; Hareedy, A.; Dolecek, L. Finite-length construction of high performance spatially-coupled codes via optimized partitioning and lifting. IEEE Trans. Commun. 2018, 67, 3–16. [Google Scholar] [CrossRef] [Green Version]
- Fang, Y.; Chen, P.; Cai, G.; Lau, F.C.; Liew, S.C.; Han, G. Outage-limit-approaching channel coding for future wireless communications: Root-protograph low-density parity-check codes. IEEE Veh. Technol. Mag. 2019, 14, 85–93. [Google Scholar] [CrossRef]
PC 1 (Sender) | PC 2 (Receiver) | |
---|---|---|
Processor | Intel(R) Core(TM) i5-4210U | Intel(R) Core(TM) i7-6500U |
CPU speed | 1.70 GHz 2.40 GHz | 2.50 GHz 2.60 GHz |
RAM | 6.00 GB | 8.00 GB |
System type | 64-bits | 64-bits |
Adapter type | Ethernet 802.3 | Ethernet 802.3 |
Network Configuration 1 (Private) | Network Configuration 2 (Public) | |
---|---|---|
Internet speed | 52.1 mbps download 15.9 mbps upload | 42.8 mbps download 47.1 mbps upload |
Latency | 55 ms | 58 ms |
Router type | Home hub 3000 | D-link |
Number of hops | 1 | 1 |
Geographical location | Personal use network St John’s, NL | Research lab at Memorial University John’s, NL |
Network Configuration1 | Network Configuration 2 | ||||
---|---|---|---|---|---|
c Value | Zero Delays | One Delays | Zero Delays | Zero Delays | |
0.025 | |||||
0.500 | |||||
10.00 | |||||
20.00 | |||||
30.00 |
Binary Symbol | Binary Delays (Seconds) | Time Range (Seconds) | Probabilities | |
---|---|---|---|---|
Binary Symbol | Binary Delays (Seconds) | Time Range (Seconds) | Probabilities | |
---|---|---|---|---|
© 2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
Share and Cite
Al-Eidi, S.; Darwish, O.; Chen, Y. Covert Timing Channel Analysis Either as Cyber Attacks or Confidential Applications. Sensors 2020, 20, 2417. https://doi.org/10.3390/s20082417
Al-Eidi S, Darwish O, Chen Y. Covert Timing Channel Analysis Either as Cyber Attacks or Confidential Applications. Sensors. 2020; 20(8):2417. https://doi.org/10.3390/s20082417
Chicago/Turabian StyleAl-Eidi, Shorouq, Omar Darwish, and Yuanzhu Chen. 2020. "Covert Timing Channel Analysis Either as Cyber Attacks or Confidential Applications" Sensors 20, no. 8: 2417. https://doi.org/10.3390/s20082417
APA StyleAl-Eidi, S., Darwish, O., & Chen, Y. (2020). Covert Timing Channel Analysis Either as Cyber Attacks or Confidential Applications. Sensors, 20(8), 2417. https://doi.org/10.3390/s20082417