A Covert Queueing Channel in FCFS Schedulers

We study covert queueing channels (CQCs), which are a kind of covert timing channel that may be exploited in shared queues across supposedly isolated users. In our system model, a user sends messages to another user via his pattern of access to the shared resource, which serves the users according to a first come first served (FCFS) policy. One example of such a channel is the cross-virtual network covert channel in data center networks, resulting from the queueing effects of the shared resource. First, we study a system comprising a transmitter and a receiver that share a deterministic and work-conserving FCFS scheduler, and we compute the capacity of this channel. We also consider the effect of the presence of other users on the information transmission rate of this channel. The achievable information transmission rates obtained in this paper demonstrate the possibility of significant information leakage and great privacy threats brought by CQCs in FCFS schedulers.

[1]  Donald F. Towsley,et al.  Covert communications on Poisson packet channels , 2015, 2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[2]  Nick McKeown,et al.  OpenFlow: enabling innovation in campus networks , 2008, CCRV.

[3]  Xun Gong,et al.  Sneak-Peek: High speed covert channels in data center networks , 2016, IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications.

[4]  Dawn Xiaodong Song,et al.  Timing Analysis of Keystrokes and Timing Attacks on SSH , 2001, USENIX Security Symposium.

[5]  Charles V. Wright,et al.  Uncovering Spoken Phrases in Encrypted Voice over IP Conversations , 2010, TSEC.

[6]  Xun Gong,et al.  Quantifying the Information Leakage in Timing Side Channels in Deterministic Work-Conserving Schedulers , 2016, IEEE/ACM Transactions on Networking.

[7]  Parv Venkitasubramaniam,et al.  Mitigating timing based information leakage in shared schedulers , 2012, 2012 Proceedings IEEE INFOCOM.

[8]  Xun Gong,et al.  Information theoretic analysis of side channel information leakage in FCFS schedulers , 2011, 2011 IEEE International Symposium on Information Theory Proceedings.

[9]  Todd P. Coleman,et al.  Characterizing the Efficacy of the NRL Network Pump in Mitigating Covert Timing Channels , 2012, IEEE Transactions on Information Forensics and Security.

[10]  Sergio Verdú,et al.  Bits through queues , 1994, Proceedings of 1994 IEEE International Symposium on Information Theory.

[11]  Carla E. Brodley,et al.  IP covert timing channels: design and detection , 2004, CCS '04.

[12]  Xun Gong,et al.  Capacity limit of queueing timing channel in shared FCFS schedulers , 2015, 2015 IEEE International Symposium on Information Theory (ISIT).

[13]  Yi Lu,et al.  A Covert Queueing Channel in Round Robin Schedulers , 2017, ArXiv.

[14]  Virgil Gligor Covert Channel Analysis of Trusted Systems. A Guide to Understanding , 1993 .

[15]  F. Alajaji,et al.  Lectures Notes in Information Theory , 2000 .

[16]  Xun Gong,et al.  Low-Cost Side Channel Remote Traffic Analysis Attack in Packet Networks , 2010, 2010 IEEE International Conference on Communications.

[17]  Alan Miller,et al.  An Evaluation Framework for the Analysis of Covert Channels in the TCP/IP Protocol Suite , 2005, ECIW.

[18]  Thomas M. Cover,et al.  Elements of Information Theory , 2005 .

[19]  Pritam Mukherjee,et al.  Covert bits through queues , 2016, 2016 IEEE Conference on Communications and Network Security (CNS).

[20]  Sibin Mohan,et al.  Schedule-Based Side-Channel Attack in Fixed-Priority Real-time Systems , 2015 .

[21]  Steven J. Murdoch,et al.  Embedding Covert Channels into TCP/IP , 2005, Information Hiding.

[22]  Donald F. Towsley,et al.  Covert communications on renewal packet channels , 2016, 2016 54th Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[23]  Imre Csiszár,et al.  Information Theory - Coding Theorems for Discrete Memoryless Systems, Second Edition , 2011 .

[24]  Brian Neil Levine,et al.  Inferring the source of encrypted HTTP connections , 2006, CCS '06.

[25]  Nikita Borisov,et al.  Website Detection Using Remote Traffic Analysis , 2011, Privacy Enhancing Technologies.

[26]  Vincent H. Berk,et al.  Detection of Covert Channel Encoding in Network Packet Delays , 2005 .

[27]  Steven Gianvecchio,et al.  Detecting covert timing channels: an entropy-based approach , 2007, CCS '07.

[28]  Ira S. Moskowitz,et al.  A Network Pump , 1996, IEEE Trans. Software Eng..