A sensitive network jitter measurement for covert timing channels over interactive traffic

In order to reflect the network transmission quality, some network state feedback mechanisms are provided in the network protocol. In the RTP, the jitter of the packet transmission delay is fed back through the jitter field in the RTCP packet. This feedback value is a very important reference data when the covert timing channel is established. However, the sending frequency of the RTCP packet is low and the feedback value of the RTCP packet are only the jitter value of the last RTP packet associated with this RTCP packet when it is sent. Therefore, the jitter feedback mechanism in the existing RTCP protocol has the problem of lack of feedback on the network state during the period between two RTCP data packets. As a result, the feedback value is highly susceptible to extreme values, which prevents it from providing an accurate numerical reference for establishing covert channels. Therefore, in this paper, a buffer was established between the last RTCP packet and the current RTCP packet. And we choose to set the interval is n RTP packets and record the corresponding position jitter value in the buffer. The data in the buffer is averaged, and the mean value is weighted and averaged with the jitter value of the current RTCP packet as a new jitter feedback value. The effect of the extreme value on the feedback value is reduced, thereby it contribute to the improvement of the feedback energy for the state of the network. In addition, the bit error rate generated by establishing a simple covert timing channel for data transmission under different network conditions is compared with the change of two jitter feedback values. It is verified that there is a positive correlation between the feedback value of the new feedback mode and the error rate. through the comparison It is verified that the new feedback method can provide a more accurate reference for the establishment of covert channels.

[1]  Hamid Sharif,et al.  Towards a Reliable Detection of Covert Timing Channels over Real-Time Network Traffic , 2017, IEEE Transactions on Dependable and Secure Computing.

[2]  G. Lakpathi,et al.  Identity-Based Encryption with Outsourced Revocation in Cloud Computing , 2016 .

[3]  Jean Meloche,et al.  Statistical Aspects of the Analysis of Data Networks , 2007, Technometrics.

[4]  Alessandro Andreadis,et al.  A cross-layer jitter-based TCP for wireless networks , 2016, EURASIP J. Wirel. Commun. Netw..

[5]  Stefano Avallone,et al.  An analysis of the impact of network device buffers on packet schedulers through experiments and simulations , 2018, Simul. Model. Pract. Theory.

[6]  Xiaojun Chang,et al.  Semisupervised Feature Analysis by Mining Correlations Among Multiple Tasks , 2014, IEEE Transactions on Neural Networks and Learning Systems.

[7]  Jin Li,et al.  Privacy-preserving outsourced classification in cloud computing , 2017, Cluster Computing.

[8]  Witawas Srisa-an,et al.  SigPID: significant permission identification for android malware detection , 2016, 2016 11th International Conference on Malicious and Unwanted Software (MALWARE).

[9]  Mahmoud Al-Ayyoub,et al.  Accelerating 3D medical volume segmentation using GPUs , 2016, Multimedia Tools and Applications.

[10]  Mohsen Guizani,et al.  Toward Delay-Tolerant Flexible Data Access Control for Smart Grid With Renewable Energy Resources , 2017, IEEE Transactions on Industrial Informatics.

[11]  Carla E. Brodley,et al.  IP covert timing channels: design and detection , 2004, CCS '04.

[12]  Dipak Ghosal,et al.  A Covert Timing Channel Based on Fountain Codes , 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications.

[13]  Jian Shen,et al.  Cloud-aided lightweight certificateless authentication protocol with anonymity for wireless body area networks , 2018, J. Netw. Comput. Appl..

[14]  Dipak Ghosal,et al.  A Survey of Timing Channels and Countermeasures , 2017, ACM Comput. Surv..

[15]  Yuan Xue,et al.  A code protection scheme by process memory relocation for android devices , 2017, Multimedia Tools and Applications.

[16]  Chung G. Kang,et al.  LTE Network Emulator for VoLTE Service , 2014 .

[17]  Feiping Nie,et al.  Compound Rank- $k$ Projections for Bilinear Analysis , 2014, IEEE Transactions on Neural Networks and Learning Systems.

[18]  Marcin Szpyrka FAST AND FLEXIBLE MODELLING OF REAL-TIME SYSTEMS WITH RTCP-NETS , 2004 .

[19]  Jin Li,et al.  Flexible neural trees based early stage identification for IP traffic , 2017, Soft Comput..

[20]  Jie Wu,et al.  Preserving Privacy with Probabilistic Indistinguishability in Weighted Social Networks , 2017, IEEE Transactions on Parallel and Distributed Systems.

[21]  Xiaojun Chang,et al.  Feature Interaction Augmented Sparse Learning for Fast Kinect Motion Detection , 2017, IEEE Transactions on Image Processing.

[22]  Xiangyun Zhou,et al.  On Covert Communication With Noise Uncertainty , 2016, IEEE Communications Letters.

[23]  Yi Yang,et al.  Bi-Level Semantic Representation Analysis for Multimedia Event Detection , 2017, IEEE Transactions on Cybernetics.

[24]  Yi Yang,et al.  Semantic Pooling for Complex Event Analysis in Untrimmed Videos , 2017, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[25]  Yu-Hui Wang,et al.  Applying Patent-Based Fuzzy Quality Function Deployment to Explore Prospective VoLTE Technologies , 2016, Int. J. Fuzzy Syst..

[26]  Rauf Izmailov,et al.  Performance Optimization of VoIP using an Overlay Network , 2005 .

[27]  Sushil Jajodia,et al.  Model-Based Covert Timing Channels: Automated Modeling and Evasion , 2008, RAID.

[28]  Jacob Philip,et al.  Composition dependence of optical band gap and thermal diffusivity of AsTeSe glasses , 1992 .

[29]  Yu-an Tan,et al.  A methodology for determining the image base of ARM-based industrial control system firmware , 2017, Int. J. Crit. Infrastructure Prot..

[30]  Henning Schulzrinne,et al.  RTP: A Transport Protocol for Real-Time Applications , 1996, RFC.

[31]  N. deSouza,et al.  Investigation of metabolite changes in the transition from pre‐invasive to invasive cervical cancer measured using 1H and 31P magic angle spinning MRS of intact tissue , 2009, NMR in biomedicine.

[32]  Henning Schulzrinne,et al.  Internet Services: from Electronic Mail to Real-Time Multimedia , 1995, Kommunikation in Verteilten Systemen.

[33]  Xiaojiang Du,et al.  Achieving Efficient and Secure Data Acquisition for Cloud-Supported Internet of Things in Smart Grid , 2017, IEEE Internet of Things Journal.

[34]  Georg Carle,et al.  Survey of error recovery techniques for IP-based audio-visual multicast applications , 1997, IEEE Netw..

[35]  Can Zhang,et al.  Cryptographic key protection against FROST for mobile devices , 2016, Cluster Computing.

[36]  Kwang-deok Seo,et al.  A client-driven media synchronization mechanism for RTP packet-based video streaming , 2015, Journal of Real-Time Image Processing.

[37]  Yuan Xue,et al.  An Identity-Based Proxy Signature on NTRU Lattice , 2018 .

[38]  Jin Li,et al.  Secure attribute-based data sharing for resource-limited users in cloud computing , 2018, Comput. Secur..

[39]  Mahmoud Al-Ayyoub,et al.  Improving the performance of the needleman-wunsch algorithm using parallelization and vectorization techniques , 2017, Multimedia Tools and Applications.

[40]  Jin Li,et al.  Insight of the protection for data security under selective opening attacks , 2017, Inf. Sci..

[41]  Kejie Lu,et al.  Construction and Mitigation of User-Behavior-Based Covert Channels on Smartphones , 2018, IEEE Transactions on Mobile Computing.

[42]  Liehuang Zhu,et al.  A round-optimal lattice-based blind signature scheme for cloud services , 2017, Future Gener. Comput. Syst..

[43]  B. B. Gupta,et al.  Secure and imperceptible digital image steganographic algorithm based on diamond encoding in DWT domain , 2017, Multimedia Tools and Applications.

[44]  Chen Liang,et al.  An optimized data hiding scheme for Deflate codes , 2018, Soft Comput..

[45]  Zhenyu Wu,et al.  Whispers in the Hyper-Space: High-Bandwidth and Reliable Covert Channel Attacks Inside the Cloud , 2015, IEEE/ACM Transactions on Networking.

[46]  Xiaojiang Du,et al.  Towards Delay-Tolerant Flexible Data Access Control for Smart Grid with Renewable Energy Resources , 2018, ArXiv.

[47]  Chengqi Zhang,et al.  Convex Sparse PCA for Unsupervised Feature Learning , 2014, ACM Trans. Knowl. Discov. Data.

[48]  Ghizlane Orhanou,et al.  Secure Mobile Multi Cloud Architecture for Authentication and Data Storage , 2017, Int. J. Cloud Appl. Comput..

[49]  Zouhair Guennoun,et al.  Towards successful VoLTE and VoWiFi deployment: network function virtualization solutions’ benefits and challenges , 2017, Telecommun. Syst..