A Survey of Key Technologies for Constructing Network Covert Channel

In order to protect user privacy or guarantee free access to the Internet, the network covert channel has become a hot research topic. It refers to an information channel in which the messages are covertly transmitted under the network environment. In recent years, many new construction schemes of network covert channels are proposed. But at the same time, network covert channel has also received the attention of censors, leading to many attacks. The network covert channel refers to an information channel in which the messages are covertly transmitted under the network environment. Many users exploit the network covert channel to protect privacy or guarantee free access to the Internet. Previous construction schemes of the network covert channel are based on information steganography, which can be divided into CTCs and CSCs. In recent years, there are some covert channels constructed by changing the transmission network architecture. On the other side, some research work promises that the characteristics of emerging network may better fit the construction of the network covert channel. In addition, the covert channel can also be constructed by changing the transmission network architecture. The proxy and anonymity communication technology implement this construction scheme. In this paper, we divide the key technologies for constructing network covert channels into two aspects: communication content level (based on information steganography) and transmission network level (based on proxy and anonymity communication technology). We give an comprehensively summary about covert channels at each level. We also introduce work for the three new types of network covert channels (covert channels based on streaming media, covert channels based on blockchain, and covert channels based on IPv6). In addition, we present the attacks against the network covert channel, including elimination, limitation, and detection. Finally, the challenge and future research trend in this field are discussed.

[1]  Xin Liu,et al.  Deep Learning for Encrypted Traffic Classification: An Overview , 2018, IEEE Communications Magazine.

[2]  Michael K. Reiter,et al.  Crowds: anonymity for Web transactions , 1998, TSEC.

[3]  Aravind Srinivasan,et al.  P/sup 5/ : a protocol for scalable anonymous communication , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.

[4]  R. A. Leibler,et al.  On Information and Sufficiency , 1951 .

[5]  David Chaum,et al.  The dining cryptographers problem: Unconditional sender and recipient untraceability , 1988, Journal of Cryptology.

[6]  Nuno Santos,et al.  DeltaShaper: Enabling Unobservable Censorship-resistant TCP Tunneling over Videoconferencing Streams , 2017, Proc. Priv. Enhancing Technol..

[7]  Thomas Ristenpart,et al.  Network Traffic Obfuscation and Automated Internet Censorship , 2016, IEEE Security & Privacy.

[8]  Paul F. Syverson,et al.  Onion routing , 1999, CACM.

[9]  Wojciech Mazurczyk,et al.  Retransmission steganography and its detection , 2011, Soft Comput..

[10]  Yongji Wang,et al.  Improving performance of network covert timing channel through Huffman coding , 2012, Math. Comput. Model..

[11]  Chunhui Zhao,et al.  An Enlarging-the-Capacity Packet Sorting Covert Channel , 2019, IEEE Access.

[12]  Giuseppe Baselli,et al.  Measuring regularity by means of a corrected conditional entropy in sympathetic outflow , 1998, Biological Cybernetics.

[13]  Peter James Vial,et al.  High capacity adaptive image steganography with cover region selection using dual-tree complex wavelet transform , 2020, Cognitive Systems Research.

[14]  Yuewei Dai,et al.  Network covert timing channel with distribution matching , 2012, Telecommun. Syst..

[15]  Sebastian Zander,et al.  A survey of covert channels and countermeasures in computer network protocols , 2007, IEEE Communications Surveys & Tutorials.

[16]  Songlin Sun,et al.  Research on Covert Communication Security Based on Screen Content Coding , 2020, IEEE Access.

[17]  Hamid Sharif,et al.  A Support Vector Machine-Based Framework for Detection of Covert Timing Channels , 2016, IEEE Transactions on Dependable and Secure Computing.

[18]  Feng Hao,et al.  ZombieCoin 2.0: managing next-generation botnets using Bitcoin , 2018, International Journal of Information Security.

[19]  Sebastian Zander,et al.  Pattern-Based Survey and Categorization of Network Covert Channel Techniques , 2014, ACM Comput. Surv..

[20]  Dipak Ghosal,et al.  A comparative analysis of detection metrics for covert timing channels , 2014, Comput. Secur..

[21]  Vitaly Shmatikov,et al.  CovertCast: Using Live Streaming to Evade Internet Censorship , 2016, Proc. Priv. Enhancing Technol..

[22]  Yuanzhang Li,et al.  A Covert Channel Over VoLTE via Adjusting Silence Periods , 2018, IEEE Access.

[23]  H. Lilliefors On the Kolmogorov-Smirnov Test for Normality with Mean and Variance Unknown , 1967 .

[24]  Srinivas Devadas,et al.  Riffle: An Efficient Communication System With Strong Anonymity , 2016, Proc. Priv. Enhancing Technol..

[25]  Vijay Varadharajan,et al.  The Silence of the LANs: Efficient Leakage Resilience for IPsec VPNs , 2014, IEEE Trans. Inf. Forensics Secur..

[26]  Liehuang Zhu,et al.  A packet-reordering covert channel over VoLTE voice and video traffics , 2019, J. Netw. Comput. Appl..

[27]  Michael K. Reiter,et al.  Anonymous Web transactions with Crowds , 1999, CACM.

[28]  Javier López,et al.  Covert communications through network configuration messages , 2013, Comput. Secur..