|Table of Contents|

Model of synergetic network covert timing channel

《南京理工大学学报》(自然科学版)[ISSN:1005-9830/CN:32-1397/N]

Issue:
2013年05期
Page:
741-
Research Field:
Publishing date:

Info

Title:
Model of synergetic network covert timing channel
Author(s):
Qian Yuwen1Song Huaju2Zhang Tongfang1Tang Yi1
1.School of Electronic Engineering and Optoelectronic Technology,NUST,Nanjing 210094,China; 2.Nanjing Xiaozhuang University,Nanjing 210011,China
Keywords:
computer network network security steganography covert timing channel robustness
PACS:
TP393.08
DOI:
-
Abstract:
In order to solve the problem that the traditional network synergetic covert timing channel is unstable and unefficient,the model of synergetic covert timing channel(SCTC)is proposed to send the covert information by several computers collaborated with each other.A reliable communication protocol synchronizing the transmitter and the receiver is designed to ensure the stability of SCTC.To improve the convenience of the covert channel,the covert information is embedded in a transparent way,and the coding scheme of “2-bits to one inter packets delay” is adopted.The results of covert communicate experiments show that,the transmission efficiency of SCTC is about 2.6 times of that of the traditional timing channel,and it has better robustness and the undetectability.

References:

[1] Butler Lampson.A note on the confinement problem[J].Communications of the ACM,1973,16(10):613-115.
[2]Alex Snoeren,Craig Partridge,Luis Sanchez,et.al.Single Packet IP Trace back[J].ACM/IEEE Transaction on Networking,2002,10(6):721-734.
[3]Sebastian Zander,Grenville Armitage,Phillip Branch.A Survey of covert channels and Countermeasures in computer network protocols[J].IEEE Communications Surveys and Tutorials,2007,9(3):44-57.
[4]王永吉,吴敬征,曾海涛,等.隐蔽信道研究[J].软件学报,2010,21(9):2263-2288.
Wang Yongji,Wu Jingzheng,Zeng Haitao,et al.Covert channel research[J].Journal of Software,2010,21(9):2263-2288.
[5]Sarah sellke,Wang Chihchun,Saurabh bagchi,et al.Covert TCP/IP timing channels:Theory to implementation[A].Proceedings of Infocom[C].Riode Janeiro,Brazil:ACM,2009:2204-2212.
[6]Sendar Cabuk,Carla Brodley,Clay Shields.IP covert channel detection[J].Transactions on Information and System Security of ACM,2009:12(4)22:1-22:27.
[7]Berk V,Giani A,Cybenko G.Detection of covert channel encoding in network packet delays(Technical Report TR536)[R].Hanover,USA:Department of Computer Science,Dartmouth College,2005.
[8]Gaurav Shah,Andres Molina,Matt Blaze.Keyboards and covert channels[A].USENIX Security Symposium[C].Vancouver,Canada:USENIX Association,2006:59-75.
[9]钱玉文,王飞,孔建寿,等 基于多智能体的网络信息隐藏系统研究[J].南京理工大学学报,2009,33(3):302-305.
Qian Yuwen,Wang Fei,Kong Jianshou,et al.Network steganography system based on multi-agent[J].Journal of Nanjing University of Science and Technology,2009,33(3):302-305.
[10]钱玉文,赵邦信,孔建寿,等.一种基于Web的可靠网络隐蔽时间信道的研究[J].计算机研究与发展,2011,48(11):423-431.
Qian Yuwen,Zhao Bangxin,Kong Jianshou,et al.Robust covert timing channel based on Web[J].Journal of Computer Research and Development,2011,48(11):423-431.
[11]Ira Moskowitz,Myong Kang.Covert channels here to Stay?[A].Proceedings of the Ninth Annual Conference on Computer Assurance[C].Gaithersburg,USA:National Institute of Standards and Technology,1994:235-243.
[12]Wang Xinyuan,Douglas Reeves.Robust correlation of encrypted attack traffic through stepping stones by manipulation of inter-packet delays[A].Proceedings of the 2003 ACM Conference on Computer and Communications Security[C].Washington,DC,USA:ACM,2003:20-29.
[13]Steven Gianvecchio,Haining Wang.Detecting covert timing channels:An entropy based approach[A].Proceedings of ACM Conference on Computer and Communications Security[J].Alexandria,USA:ACM,2007:307-316.

Memo

Memo:
-
Last Update: 2013-10-31