A Performance Analysis of Authentication Using Covert Timing Channels
نویسندگان
چکیده
Authentication over a network is an important and difficult problem. Accurately determining the authenticity of a node or user is critical in maintaining the security of a network. Our proposed technique covertly embeds a watermark, or identifying tag, within a data stream. By implementing this model on a LAN and WLAN we show that this method is easily adaptable to a variety of networking technologies, and easily scalable. While our technique increases the time required for data to be transferred, we show that the throughput of the link during the brief authentication window is decreased by no more than 8% in a switched LAN and 11% in a WLAN. During our empirical analysis we were able to detect the watermark with 100% accuracy in both a LAN and WLAN environment.
منابع مشابه
طراحی و ارزیابی روش کدگذاری ترکیبی برای کانال پوششی زمانبندیدار در شبکه اینترنت
Covert channel means communicating information through covering of overt and authorized channel in a manner that existence of channel to be hidden. In network covert timing channels that use timing features of transmission packets to modulating covert information, the appropriate encoding schema is very important. In this paper, a hybrid encoding schema proposed through combining "the inter-pac...
متن کاملA Review on Covert Timing Channels & their Applications
Covert network timing channels control time between transmissions of packets in overt network communication and transmits hidden messages. This paper presents an overview of different concepts of covert timing channels such as types, features and properties. There is range of terms used for security of information such as encryption, covert channels, network steganography or information hiding ...
متن کاملCountermeasures and Tradeoos for a Class of Covert Timing Channels Index Terms
We identify a class of covert timing channels with the following properties. (1) existing covert timing channel analysis techniques are inappropriate for the channels in this class; and (2) it includes the fastest (i.e., highest capacity) covert channels known to date. Since channels in this class are exploited by counting the occurrences of certain events, we call them counting channels. We de...
متن کاملMethods of IPD normalization to counteract IP timing covert channels
Covert channels are used for information transmission in a manner that is not intended for communication and is difficult to detect. We propose a technique to prevent the information leakage via IP covert timing channels by inter-packet delays normalization in the process of packets sending. Recommendations for using the counteraction methods and choosing parameters were given. The advantage of...
متن کاملCovert Channels Can Be Useful! – Layering Authentication Channels to Provide Covert Communication
This paper argues the need for providing a covert backchannel communication mechanism in authentication protocols, discusses various practical uses for such a channel, and desirable features for its design and deployment. Such a mechanism would leverage the current authentication channel to carry out the covert communication rather than introducing a separate one. The communication would need t...
متن کامل