DocumentCode :
568482
Title :
A Covert Timing Channel Based on Fountain Codes
Author :
Archibald, Rennie ; Ghosal, Dipak
Author_Institution :
Dept. of Comput. Sci., Univ. of California at Davis, Davis, CA, USA
fYear :
2012
fDate :
25-27 June 2012
Firstpage :
970
Lastpage :
977
Abstract :
A model-based Covert Timing Channel (CTC) embeds a covert message into the inter-packet delays (IPDs) of the network traffic generated by a legitimate overt application. The modulated IPDs are generated to follow a well known statistical model of the overt application´s network traffic. This provides non-detectability of the covert channel using certain statistical tests and hence the modulation is referred to as model-secure. However, jitter, introduced by the network or an adversary, can disrupt the timing channel. In this work, we improve the CTC´s robustness without prior knowledge of the channel error characteristics. We encode the covert message using Fountain codes, continuously generating encoded symbols until transmission is successful. Additionally, we reduce bit error with an IPD guard band between the intervals that represent the binary alphabet. While the guard band reduces bit error, it also alters the IPD distribution, resulting in degraded model-security. We measure the loss in model-security using the Kolmogorov-Smirnov (KS) test and the Kullback-Leibler (KL) divergence measure and study the trade-off between security, robustness, and throughput. We describe the implementation of the Fountain code based covert communication system, which we refer to as the Covert Fountain, and extensively study the performance under multiple network settings.
Keywords :
computer network security; jitter; statistical analysis; telecommunication channels; CTC; CTC robustness improvement; IPD distribution; IPD guard band; KL divergence measure; KS test; Kolmogorov-Smirnov test; Kullback-Leibler divergence measure; binary alphabet; bit error reduction; channel error characteristics; covert channel nondetectability; covert message; fountain code-based covert communication system; inter-packet delays; jitter; legitimate overt application network traffic; model-based covert timing channel; model-security degradation; modulated IPD generation; network traffic; statistical model; throughput; timing channel; Decoding; Encoding; Jitter; Receivers; Robustness; Security; Timing; Covert Timing Channel; Fountain Codes; Guard Band; Markov Modulated Poisson Process; Security;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Trust, Security and Privacy in Computing and Communications (TrustCom), 2012 IEEE 11th International Conference on
Conference_Location :
Liverpool
Print_ISBN :
978-1-4673-2172-3
Type :
conf
DOI :
10.1109/TrustCom.2012.21
Filename :
6296078
Link To Document :
بازگشت