PURDUE UNIVERSITY TECHNICAL REPORT Camouflaging Timing Channels in Web Traffic
نویسندگان
چکیده
Web traffic accounts for more than half of Internet traffic today. Camouflaging covert timing channels in Web traffic would be advantageous for concealment. In this paper, we investigate the possibility of disguising network covert timing channels as HTTP traffic to avoid detection. Extensive research has shown that Internet traffic, including HTTP traffic, exhibits self-similarity and long range persistence. Existing covert timing channels that mimic i.i.d. legitimate traffic cannot imitate HTTP traffic because these covert traffic patterns are not long range dependent. The goal of this work is to design a covert timing channel that can be camouflaged as HTTP traffic. To this end, we design a covert timing channel whose inter-arrival times are long range dependent and have the same marginal distribution as the interarrival times for new HTTP connection traffic. These inter-arrival times are constructed by combining a Fractional Auto-Regressive Integrated Moving Average (FARIMA) time series and an i.i.d. cryptographically secure random sequence. Experiments are conducted on PlanetLab, and the results are validated against recent real traffic trace data. Our experiments demonstrate that the traffic from this timing channel traffic is statistically indistinguishable from legitimate HTTP traffic and undetectable by all current detection schemes for timing channels.
منابع مشابه
Steganographic Timing Channels
This paper describes steganographic timing channels that use cryptographic primitives to hide the presence of covert channels in the timing of network traffic. We have identified two key properties for steganographic timing channels: (1) the parameters of the scheme should be cryptographically keyed, and (2) the distribution of input timings should be indistinguishable from output timings. Thes...
متن کاملImproving Tor security against timing and traffic analysis attacks with fair randomization
The Tor network is probably one of the most popular online anonymity systems in the world. It has been built based on the volunteer relays from all around the world. It has a strong scientific basis which is structured very well to work in low latency mode that makes it suitable for tasks such as web browsing. Despite the advantages, the low latency also makes Tor insecure against timing and tr...
متن کاملEfficient Network Camouflaging in Wireless Networks
Efficient Network Camouflaging in Wireless Networks. (December 2005) Shu Jiang, B.E., University of Science and Technology, China; M.E., Nanjing University, China Co–Chairs of Advisory Committee: Dr. Nitin H. Vaidya Dr. Wei Zhao Camouflaging is about making something invisible or less visible. Network camouflaging is about hiding certain traffic information (e.g. traffic pattern, traffic flow i...
متن کاملPurdue University Graduate School Thesis Acceptance
Cabuk, Serdar Ph.D., Purdue University, December, 2006. Network Covert Channels: Design, Analysis, Detection, and Elimination. Major Professors: Carla E. Brodley and Eugene H. Spafford. Indirect communication channels have been effectively employed in the communications world to bypass mechanisms that do not permit direct communication between unauthorized parties. Such covert channels emerge a...
متن کاملPerformance Measures for Local Agency Traffic Signals
This document is disseminated under the sponsorship of the Indiana LTAP Center at Purdue University in the interest of information exchange. Purdue University and the Indiana LTAP Center assume no liability for its contents or use thereof. Purdue University and the Indiana LTAP Center do not endorse products or manufacturers. Trademarks or manufacturers names may appear herein only because they...
متن کامل