Behavioral Mimicry Covert Communication
نویسنده
چکیده
Covert communication refers to the process of communicating data through a channel that is neither designed, nor intended to transfer information. Traditionally, covert channels are considered as security threats in computer systems and a great deal of attention has been given to countermeasures for covert communication schemes. The evolution of computer networks led the communication community to revisit the concept of covert communication not only as a security threat but also as an alternative way of providing security and privacy to communication networks. In fact, the heterogeneous structure of computer networks and the diversity of communication protocols provide an appealing setting for covert channels. This dissertation is an exploration on a novel design methodology for undetectable and robust covert channels in communication networks. Our new design methodology is based on the concept of behavioral mimicry in computer systems. The objective is to design a covert transmitter that has enough degrees of freedom to behave like an ordinary transmitter and react normally to unpredictable network events, yet it has the ability to modulate a covert message over its behavioral fingerprints in the network. To this end, we argue that the inherent randomness in communication protocols and network environments is the key in finding the proper medium for network covert channels. We present a few examples on how random behaviors in communication protocols lead to discovery of suitable shared resources for covert channels. The proposed design methodology is tested on two new covert communication schemes, one is designed for wireless networks and the other one is optimized for public communication networks (e.g., Internet). Each design is accompanied by a comprehensive analysis from undetectability, achievable covert rate and reliability perspectives. In particular, we introduced turbo covert channels, a family of extremely robust model-based timing covert channels that achieve provable polynomial undetectability in public communication networks. This means that the covert channel is undetectable against any polynomial-time statistical test that analyzes samples of the covert traffic and the legitimate traffic of the network. Target applications for the proposed covert communication schemes are discussed including detailed practical scenarios in which the proposed channels can be implemented.
منابع مشابه
ProtoLeaks: A Reliable and Protocol-Independent Network Covert Channel
We propose a theoretical framework for a network covert channel based on enumerative combinatorics. It offers protocol independence and avoids detection by using a mimicry defense. Using a network monitoring phase, traffic is analyzed to detect which application-layer protocols are allowed through the firewalls. Using these results, a covert channel is built based on permutations of benign netw...
متن کاملSocial top-down response modulation (STORM): a model of the control of mimicry in social interaction
As a distinct feature of human social interactions, spontaneous mimicry has been widely investigated in the past decade. Research suggests that mimicry is a subtle and flexible social behavior which plays an important role for communication and affiliation. However, fundamental questions like why and how people mimic still remain unclear. In this paper, we evaluate past theories of why people m...
متن کاملUsing nonconscious behavioral mimicry to create affiliation and rapport.
Nonconscious behavioral mimicry occurs when a person unwittingly imitates the behaviors of another person. This mimicry has been attributed to a direct link between perceiving a behavior and performing that same behavior. The current experiments explored whether having a goal to affiliate augments the tendency to mimic the behaviors of interaction partners. Experiment 1 demonstrated that having...
متن کاملMimicry of Food Intake: The Dynamic Interplay between Eating Companions
Numerous studies have shown that people adjust their intake directly to that of their eating companions; they eat more when others eat more, and less when others inhibit intake. A potential explanation for this modeling effect is that both eating companions' food intake becomes synchronized through processes of behavioral mimicry. No study, however, has tested whether behavioral mimicry can par...
متن کاملFrom Cues to Signals: Evolution of Interspecific Communication via Aposematism and Mimicry in a Predator-Prey System
Current theory suggests that many signaling systems evolved from preexisting cues. In aposematic systems, prey warning signals benefit both predator and prey. When the signal is highly beneficial, a third species often evolves to mimic the toxic species, exploiting the signaling system for its own protection. We investigated the evolutionary dynamics of predator cue utilization and prey signali...
متن کامل