PHY Covert Channels: Can you see the Idles?

نویسندگان

  • Ki-Suh Lee
  • Han Wang
  • Hakim Weatherspoon
چکیده

Network covert timing channels embed secret messages in legitimate packets by modulating interpacket delays. Unfortunately, such channels are normally implemented in higher network layers (layer 3 or above) and easily detected or prevented. However, access to the physical layer of a network stack allows for timing channels that are virtually invisible: Sub-microsecond modulations that are undetectable by software endhosts. Therefore, covert timing channels implemented in the physical layer can be a serious threat to the security of a system or a network. In fact, we empirically demonstrate an effective covert timing channel over nine routing hops and thousands of miles over the Internet (the National Lambda Rail). Our covert timing channel works with cross traffic, less than 10% bit error rate, which can be masked by forward error correction, and a covert rate of 81 kilobits per second. Key to our approach is access and control over every bit in the physical layer of a 10 Gigabit network stack (a bit is 100 picoseconds wide at 10 gigabit per seconds), which allows us to modulate and interpret interpacket spacings at sub-microsecond scale. We discuss when and how a timing channel in the physical layer works, how hard it is to detect such a channel, and what is required to do so.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Paxson Spring 2013 CS 161 Computer Security Discussion 14

(a) What is the difference between side channels and covert channels? Solution: A side channel is a channel that leaks information due to the physical implementation. It's a side channel in the sense that it is not a theoretical weakness in a system, but rather an effect of its physical implementation. Side channels do not involve two cooperating parties; they instead are used by a single party...

متن کامل

Adoption of Neural Network Approach in Steganography and Digital Watermarking for Covert Communication and Copyright Protection

Now a day, covert communication is one of the most important aspects of internet. When you want to hide the data from intruders, you can use different methods for covert communication. One of the most useful methods is steganography. Other thing in the era of internet is the copyright protection, which can be implemented effectively by digital watermarking. The performance of these methods can ...

متن کامل

Network Covert Channels: Review of Current State and Analysis of Viability of the use of X.509 Certificates for Covert Communications

ACKNOWLEDGEMENTS Thank you Mum and Dad for paving the road on which I walk, for your unconditional support and infinite love. Thank you Chez and everybody at the ISG for sharing your knowledge and wisdom. Being part of this course truly has been a wonderful experience.

متن کامل

Secret Agent Radio: Covert Communication through Dirty Constellations

In this paper we propose a novel approach to implement high capacity, covert channel by encoding covert information in the physical layer of common wireless communication protocols. We call our technique Dirty Constellation because we hide the covert messages within a “dirty” constellation that mimics noise commonly imposed by hardware imperfections and channel conditions. The cover traffic in ...

متن کامل

Detection And Elimination Of Covert Communication In Transport And Internet Layer – A Survey

Covert channels use stealth communications to compromise the security policies of systems. They constitute an important security threat since they can be used to exfiltrate confidential data from networks. TCP/IP protocols are used everyday and are subject to covert channels problems. Covert channels are used for the secret transfer of information. Encryption only protects communication from be...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014