A combinatorial approach to network covert communications with applications in Web Leaks

Dependable Systems & Networks(2011)

引用 18|浏览0
暂无评分
摘要
Various effective network covert channels have recently demonstrated the feasibility of encoding messages into the timing or content of individual network objects, such as data packets and request messages. However, we show in this paper that more robust and stealthy network covert channels can be devised by exploiting the relationship of the network objects. In particular, we propose a combinatorial approach for devising a wide spectrum of covert channels which can meet different objectives based on the channel capacity and channel undetectability. To illustrate the approach, we design WebLeaks and ACKLeaks, two novel covert channels which can leak information through the data and acknowledgment traffic in a web session. We implement both channels and deploy them on the PlanetLab nodes for evaluation. Besides the channel capacity, we apply the state-of-the-art detection schemes to evaluate their camouflage capability. The experiment results show that their capacity can be boosted up by our combinatorial approach, and at the same time they can effectively evade the detection.
更多
查看译文
关键词
channel undetectability,ackleaks,various effective network,stealthy network covert channels,network object,data packet,combinatorial approach,covert channel,stealthy network,novel covert channel,combinatorial mathematics,individual network object,network covert communications,internet,covert communication,channel capacity,detection schemes,web leaks,security of data,indexes,decoding,encoding,algorithm design and analysis
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要