A Two-Way VoLTE Covert Channel With Feedback Adaptive to Mobile Network Environment

In the existing network covert channel research, the transmission of secret messages is one-way, lacking confirmation feedback on whether the secret message is successfully accepted. However, voice over LTE (VoLTE) has real-time interactive features, and the data packets between the sender and the receiver are transmitted in both directions, which facilitates the construction of a two-way covert channel with feedback. Therefore, we propose a two-way VoLTE covert channel adaptive to mobile network environment, which includes a sender-to-receiver covert timing channel that modulates covert message through actively dropping packets during the silence periods and a reverse covert storage channel that hides the acceptance of the covert message as feedback information into the feedback control information field of the real-time transport control protocol (RTCP) packet. The sender evaluates the current attack severity according to the feedback and adjusts the real-time parameters of the covert timing channel to weigh the robustness and other performance, thereby constructing a two-way covert channel adaptive to complex mobile network environments. Experimental results show that this solution can maintain voice quality which is an important performance indicator for VoLTE, while keeping the covert channel undetectable and robust.

[1]  Saurabh Bagchi,et al.  TCP/IP Timing Channels: Theory to Implementation , 2009, IEEE INFOCOM 2009.

[2]  Deepa Kundur,et al.  Practical Data Hiding in TCP/IP , 2002 .

[3]  Butler W. Lampson,et al.  A note on the confinement problem , 1973, CACM.

[4]  Yuewei Dai,et al.  Network covert timing channel with distribution matching , 2012, Telecommun. Syst..

[5]  Marston D. E. Conder,et al.  Explicit definition of the binary reflected Gray codes , 1999, Discret. Math..

[6]  Xiapu Luo,et al.  TCP covert timing channels: Design and detection , 2008, 2008 IEEE International Conference on Dependable Systems and Networks With FTCS and DCC (DSN).

[7]  Xianmin Wang,et al.  Building packet length covert channel over mobile VoIP traffics , 2018, J. Netw. Comput. Appl..

[8]  Liehuang Zhu,et al.  A packet-reordering covert channel over VoLTE voice and video traffics , 2019, J. Netw. Comput. Appl..

[9]  Chen Liang,et al.  Covert Timing Channels for IoT over Mobile Networks , 2018, IEEE Wireless Communications.

[10]  Craig A. Shue,et al.  Reporting Insider Threats via Covert Channels , 2013, 2013 IEEE Security and Privacy Workshops.

[11]  Wojciech Mazurczyk,et al.  Information Hiding Using Improper frame padding , 2010, 2010 14th International Telecommunications Network Strategy and Planning Symposium (NETWORKS).

[12]  Todd P. Coleman,et al.  Covert timing channels codes for communication over interactive traffic , 2009, 2009 IEEE International Conference on Acoustics, Speech and Signal Processing.

[13]  Chen Liang,et al.  RootAgency: A digital signature-based root privilege management agency for cloud terminal devices , 2018, Inf. Sci..

[14]  Yongji Wang,et al.  Improving performance of network covert timing channel through Huffman coding , 2012, Math. Comput. Model..

[15]  Javier López,et al.  Covert communications through network configuration messages , 2013, Comput. Secur..

[16]  C. Gray Girling,et al.  Covert Channels in LAN's , 1987, IEEE Transactions on Software Engineering.

[17]  Nikita Borisov,et al.  CoCo: Coding-Based Covert Timing Channels for Network Flows , 2011, Information Hiding.

[18]  Weiwei Liu,et al.  Designing Analog Fountain Timing Channels: Undetectability, Robustness, and Model-Adaptation , 2016, IEEE Transactions on Information Forensics and Security.

[19]  Wojciech Mazurczyk,et al.  Evaluation of steganographic methods for oversized IP packets , 2012, Telecommun. Syst..

[20]  Yu Zhang,et al.  A payload-dependent packet rearranging covert channel for mobile VoIP traffic , 2018, Inf. Sci..

[21]  W. Marsden I and J , 2012 .

[22]  C. Brodley,et al.  Network covert channels: design, analysis, detection, and elimination , 2006 .

[23]  Ehab Al-Shaer,et al.  Building Covert Channels over the Packet Reordering Phenomenon , 2009, IEEE INFOCOM 2009.

[24]  Dipak Ghosal,et al.  A Covert Timing Channel Based on Fountain Codes , 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications.

[25]  Chen Liang,et al.  A root privilege management scheme with revocable authorization for Android devices , 2018, J. Netw. Comput. Appl..

[26]  Gordon B. Agnew,et al.  Turbo covert channel: An iterative framework for covert communication over data networks , 2013, 2013 Proceedings IEEE INFOCOM.

[27]  Chen Liang,et al.  An end-to-end covert channel via packet dropout for mobile networks , 2018, Int. J. Distributed Sens. Networks.

[28]  Neil Genzlinger A. and Q , 2006 .

[29]  Kim-Kwang Raymond Choo,et al.  Exfiltrating data from Android devices , 2015, Comput. Secur..

[30]  Chen Liang,et al.  Building covert timing channels by packet rearrangement over mobile networks , 2018, Inf. Sci..

[31]  Rennie Archibald Design and Detection of Covert Communication: Timing Channels and Application Tunneling , 2013 .