A Covert Timing Channel Based on DCT Domain of Inter Packet Delay Sequence

The existing covert timing channels are always designed in time domain. Although they have high security, they are sensitive to the jitters in the network. In this paper, a new covert timing channel based on frequency domain is proposed to increase its robustness while maintaining the security. The proposed method first transforms the inter packet delay sequence (IPDs) into 1-D DCT domain and embeds secret information into the DCT coefficients. Then the packets are transmitted as the new IPDs after an IDCT transform. When the packets are received, a 1-D DCT transform is performed to the extracted IPDs and the secret information is got according to the relevant decoding method. The experimental results show the proposed method has stronger robustness compared with the existing typical covert timing channels while keeping the same security.

[1]  P ? ? ? ? ? ? ? % ? ? ? ? , 1991 .

[2]  C. Brodley,et al.  Network covert channels: design, analysis, detection, and elimination , 2006 .

[3]  Sushil Jajodia,et al.  Model-Based Covert Timing Channels: Automated Modeling and Evasion , 2008, RAID.

[4]  Steffen Wendzel,et al.  Hiding Privacy Leaks in Android Applications Using Low-Attention Raising Covert Channels , 2013, 2013 International Conference on Availability, Reliability and Security.

[5]  Yongji Wang,et al.  Identification and Evaluation of Sharing Memory Covert Timing Channel in Xen Virtual Machines , 2011, 2011 IEEE 4th International Conference on Cloud Computing.

[6]  Gaurav Shah,et al.  Keyboards and Covert Channels , 2006, USENIX Security Symposium.

[7]  Hong Zhao,et al.  WLAN covert timing channel detection , 2015, 2015 Wireless Telecommunications Symposium (WTS).

[8]  Carla E. Brodley,et al.  IP Covert Channel Detection , 2009, TSEC.

[9]  Yuewei Dai,et al.  Network covert timing channel with distribution matching , 2012, Telecommun. Syst..

[10]  Hamid Sharif,et al.  Achieving robustness and capacity gains in covert timing channels , 2014, 2014 IEEE International Conference on Communications (ICC).

[11]  Krzysztof Szczypiorski,et al.  Network steganalysis: Detection of steganography in IEEE 802.11 wireless networks , 2013, 2013 5th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT).

[12]  Nikita Borisov,et al.  CoCo: Coding-Based Covert Timing Channels for Network Flows , 2011, Information Hiding.

[13]  Wojciech Mazurczyk,et al.  Evaluation of steganographic methods for oversized IP packets , 2012, Telecommun. Syst..

[14]  Wojciech Mazurczyk,et al.  SkyDe: a Skype-based Steganographic Method , 2013, Int. J. Comput. Commun. Control.