A Combinatorial Approach to Network Covert Communications with Applications in Web Leaks

被引:0
|
作者
Luo, Xiapu [1 ]
Zhou, Peng [1 ]
Chan, Edmond W. W. [1 ]
Chang, Rocky K. C. [1 ]
Lee, Wenke [2 ]
机构
[1] Hong Kong Polytech Univ, Hong Kong, Hong Kong, Peoples R China
[2] Georgia Inst Technol, Atlanta, GA 30332 USA
基金
美国国家科学基金会;
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Various effective network covert channels have recently demonstrated the feasibility of encoding messages into the timing or content of individual network objects, such as data packets and request messages. However, we show in this paper that more robust and stealthy network covert channels can be devised by exploiting the relationship of the network objects. In particular, we propose a combinatorial approach for devising a wide spectrum of covert channels which can meet different objectives based on the channel capacity and channel undetectability. To illustrate the approach, we design WebLeaks and ACKLeaks, two novel covert channels which can leak information through the data and acknowledgment traffic in a web session. We implement both channels and deploy them on the PlanetLab nodes for evaluation. Besides the channel capacity, we apply the state-of-the-art detection schemes to evaluate their camouflage capability. The experiment results show that their capacity can be boosted up by our combinatorial approach, and at the same time they can effectively evade the detection.
引用
收藏
页码:474 / 485
页数:12
相关论文
共 50 条
  • [21] Flying Ad-Hoc Network Covert Communications with Deep Reinforcement Learning
    Li, Zonglin
    Wang, Jingjing
    Chen, Jianrui
    Fang, Zhengru
    Ren, Yong
    IEEE WIRELESS COMMUNICATIONS, 2024, 31 (05) : 117 - 125
  • [22] A Protocol Independent Approach in Network Covert Channel Detection
    Ayub, Md. Ahsan
    Smith, Steven
    Siraj, Ambareen
    2019 22ND IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (IEEE CSE 2019) AND 17TH IEEE INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (IEEE EUC 2019), 2019, : 171 - 176
  • [23] Interference Minimization for Device-to-Device Communications: A Combinatorial Approach
    Saha, Peash Ranjan
    Choudhury, Salimur
    Gaur, Daya Ram
    2019 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2019,
  • [24] A game-theoretic approach to covert communications in the presence of multiple colluding wardens
    Arghavani, Abbas
    Ahlén, Anders
    Teixeira, André
    Dey, Subhrakanti
    IEEE Wireless Communications and Networking Conference, WCNC, 2021, 2021-March
  • [25] A Game-theoretic Approach to Covert Communications in the Presence of Multiple Colluding Wardens
    Arghavani, Abbas
    Ahlen, Anders
    Teixeira, Andre
    Dey, Subhrakanti
    2021 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2021,
  • [26] An Industrial Study on Applications of Combinatorial Testing in Modern Web Development
    Ozcan, Murat
    2019 IEEE 12TH INTERNATIONAL CONFERENCE ON SOFTWARE TESTING, VERIFICATION AND VALIDATION WORKSHOPS (ICSTW 2019), 2019, : 210 - 213
  • [27] Automated Combinatorial Testing for Detecting SQL Vulnerabilities in Web Applications
    Simos, Dimitris E.
    Zivanovic, Jovan
    Leithner, Manuel
    2019 IEEE/ACM 14TH INTERNATIONAL WORKSHOP ON AUTOMATION OF SOFTWARE TEST (AST 2019), 2019, : 55 - 61
  • [28] Dow installs Web-enabled communications network
    Shanley, A
    CHEMICAL ENGINEERING, 2001, 108 (04) : 64 - 64
  • [29] The seamless web and communications equity: The shaping of a community network
    Virnoche, ME
    SCIENCE TECHNOLOGY & HUMAN VALUES, 1998, 23 (02) : 199 - 220
  • [30] Side-Channel Leaks in Web Applications: a Reality Today, a Challenge Tomorrow
    Chen, Shuo
    Wang, Rui
    Wang, XiaoFeng
    Zhang, Kehuan
    2010 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, 2010, : 191 - 206