A Review on Covert Timing Channels & their Applications

نویسنده

  • Mandeep Kaur
چکیده

Covert network timing channels control time between transmissions of packets in overt network communication and transmits hidden messages. This paper presents an overview of different concepts of covert timing channels such as types, features and properties. There is range of terms used for security of information such as encryption, covert channels, network steganography or information hiding in network protocols. Information is hided into network protocols in case of covert channel, but information is hided into content in case of steganography. Different applications such as VoIP, SSH use covert timing channels for the purpose of security. In earlier days, encryption was only the parameter used for security; so information was not secure however simply using encryption does not prevent detection of communication patterns, so various techniques are developed. The main properties of covert timing channels are undetectability and robustness. Unauthorized access from criminals, hackers & terrorists is avoided by using covert timing channels etc. But there are some negativities of covert timing channels, e.g. terrorists misuse covert channels to coordinate their actions. This paper also discusses about use of covert timing channels and types along with applications and problems occur in covert timing channels.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

طراحی و ارزیابی روش کدگذاری ترکیبی برای کانال پوششی زمانبندی‌دار در شبکه اینترنت

Covert channel means communicating information through covering of overt and authorized channel in a manner that existence of channel to be hidden. In network covert timing channels that use timing features of transmission packets to modulating covert information, the appropriate encoding schema is very important. In this paper, a hybrid encoding schema proposed through combining "the inter-pac...

متن کامل

Information Theory of Covert Timing Channels

We review our recent work on the reliability function of the timing channel associated to the first in first out exponential-server queue. This result may be of use in understanding the limits to communication over covert timing channels arising in networks.

متن کامل

Employing Entropy in the Detection and Monitoring of Network Covert Channels

The detection of covert channels has quickly become a vital need due to their pervasive nature and the increasing popularity of the Internet. In recent years, new and innovative methods have been proposed to aid in the detection of covert channels. Existing detection schemes are often too specific and are ineffective against new covert channels. In this paper, we expound upon previous work done...

متن کامل

An Analysis of Covert Timing Channels

Covert channels have tmditionally been categorized as either stomge channels or timing channels[6, 71. This paper questions this categorization, and discwses channels that cannot be clearly identified as either stomge or timing channels, but have aspects of both. A new model of timing channels is presented, which allows for channels that have chamcteristics of both stomge channels and timing ch...

متن کامل

Stealthier Inter-packet Timing Covert Channels

Covert channels aim to hide the existence of communication. Recently proposed packet-timing channels encode covert data in inter-packet times, based on models of inter-packet times of normal traffic. These channels are detectable if normal inter-packet times are not independent identically-distributed, which we demonstrate is the case for several network applications. We show that ~80% of chann...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2017