A Combinatorial Approach to Network Covert Communications with Applications in Web Leaks

被引:0
|
作者
Luo, Xiapu [1 ]
Zhou, Peng [1 ]
Chan, Edmond W. W. [1 ]
Chang, Rocky K. C. [1 ]
Lee, Wenke [2 ]
机构
[1] Hong Kong Polytech Univ, Hong Kong, Hong Kong, Peoples R China
[2] Georgia Inst Technol, Atlanta, GA 30332 USA
基金
美国国家科学基金会;
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Various effective network covert channels have recently demonstrated the feasibility of encoding messages into the timing or content of individual network objects, such as data packets and request messages. However, we show in this paper that more robust and stealthy network covert channels can be devised by exploiting the relationship of the network objects. In particular, we propose a combinatorial approach for devising a wide spectrum of covert channels which can meet different objectives based on the channel capacity and channel undetectability. To illustrate the approach, we design WebLeaks and ACKLeaks, two novel covert channels which can leak information through the data and acknowledgment traffic in a web session. We implement both channels and deploy them on the PlanetLab nodes for evaluation. Besides the channel capacity, we apply the state-of-the-art detection schemes to evaluate their camouflage capability. The experiment results show that their capacity can be boosted up by our combinatorial approach, and at the same time they can effectively evade the detection.
引用
收藏
页码:474 / 485
页数:12
相关论文
共 50 条
  • [41] The multidisciplinary combinatorial approach (MCA) and its applications in engineering
    Shai, O
    AI EDAM-ARTIFICIAL INTELLIGENCE FOR ENGINEERING DESIGN ANALYSIS AND MANUFACTURING, 2001, 15 (02): : 109 - 144
  • [42] Applications of combinatorial approach to the investigation of optical functional materials
    Luo ZhenLin
    Bao Jun
    Ding JianJun
    Chen Lei
    Li XueFei
    Jiu HongFang
    Zhang QiJin
    Chan TingShan
    Liu RuXi
    Gao Chen
    CHINESE SCIENCE BULLETIN, 2009, 54 (11): : 1836 - 1844
  • [43] Performance Analysis of a Sound-Based Steganography Wireless Sensor Network to Provide Covert Communications
    Rodriguez-Gomez, Ariadna I.
    Rivero-Angeles, Mario E.
    Flores, Izlian Y. Orea
    Gallegos-Garcia, Gina
    TELECOM, 2024, 5 (03): : 652 - 679
  • [44] Relaying IRS-UAV Assisted Covert Communications in Uplink C-NOMA Network
    Qin, Xiaofei
    Na, Zhenyu
    Wen, Zihao
    Wu, Xu
    IEEE COMMUNICATIONS LETTERS, 2024, 28 (09) : 2136 - 2140
  • [45] LeakPred: An Approach for Identifying Components with Resource Leaks in Android Mobile Applications
    Lima, Josias Gomes
    Giusti, Rafael
    Dias-Neto, Arilo Claudio
    COMPUTERS, 2024, 13 (06)
  • [46] An Approach for Reverse Engineering of Web Applications
    Sun Weijun
    Li Shixian
    Liu Xianming
    ISISE 2008: INTERNATIONAL SYMPOSIUM ON INFORMATION SCIENCE AND ENGINEERING, VOL 2, 2008, : 98 - +
  • [47] An MDA approach for the development of Web applications
    Beigbeder, SM
    Castro, CC
    WEB ENGINEERING, PROCEEDINGS, 2004, 3140 : 300 - 305
  • [48] An Approach of a Framework to Create Web Applications
    Sanchez, Daniel
    Mendez, Oscar
    Florez, Hector
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2018, PT IV, 2018, 10963 : 341 - 352
  • [49] Web 2.0 Applications - An Approach to Testing
    Chakravarthy, G. S.
    Barde, Rajesh R.
    IIT: 2008 INTERNATIONAL CONFERENCE ON INNOVATIONS IN INFORMATION TECHNOLOGY, 2008, : 381 - 384
  • [50] A New Approach to Web Applications with Ajax
    吴吉义
    四川大学学报(工程科学版), 2007, (工程科学版) : 157 - 162