DocumentCode :
2771467
Title :
A typical noisy covert channel in the IP protocol
Author :
Qu, Haipeng ; Su, Purui ; Feng, Dengguo
Author_Institution :
Inst. of Software, Chinese Acad. of Sci., Beijing, China
fYear :
2004
fDate :
11-14 Oct. 2004
Firstpage :
189
Lastpage :
192
Abstract :
Previous studies have exploited a number of noiseless covert channels in the IPv4 protocol by using some fields in the IP header including the identification, the header checksum and the padding fields. These channels can transmit covert information correctly between two Internet nodes, but will be eliminated after the adoption of the IPv6 protocol. To construct a covert channel which can survive in the IPv6 protocol, a noisy covert channel is designed by using the TTL field in the IPv4 header. The channel can be exploited in the IPv6 protocol because the TTL field will be substituted by the Hop Limit field with a similar function. Two methods are presented including one-bit-per-packet method and TTL partition method. The maximal attainable bandwidth of the channel is discussed and a formula is given to calculate the maximal attainable bandwidth. The maximal attainable bandwidth is inversely proportional to the expectation and variance of the distribution of the average hop number between two communication nodes. The correlation between the maximal attainable bandwidth and the selection of the code error rate is also analyzed. Some statistics data from real networks are collected to estimate the bandwidth of the channel in practice. The result shows that the covert channel is effective in most situations.
Keywords :
Internet; channel capacity; protocols; telecommunication security; Hop Limit field; IP header; IP protocol; IPv4 header; IPv4 protocol; IPv6 protocol; Internet nodes; TCP protocol; TTL field; TTL partition method; average hop number; code error rate; communication nodes; communication security; header checksum; maximal attainable bandwidth; noiseless covert channels; noisy covert channel; one-bit-per-packet method; padding fields; Bandwidth; Communication channels; Communication system security; Content addressable storage; Data security; Error analysis; Information security; Internet; Protocols; Statistical distributions;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Security Technology, 2004. 38th Annual 2004 International Carnahan Conference on
Print_ISBN :
0-7803-8506-3
Type :
conf
DOI :
10.1109/CCST.2004.1405390
Filename :
1405390
Link To Document :
بازگشت