Covert Communications Despite Traffic Data Retention

被引:0
|
作者
Danezis, George [1 ]
机构
[1] Microsoft Res, Cambridge, England
来源
SECURITY PROTOCOLS XVI | 2011年 / 6615卷
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We show that Alice and Bob can communicate covertly and anonymously, despite Eve having access to the traffic data of most machines on the Internet. Our protocols take advantage of small amounts of shared state that exist in many TCP/IP stacks, and use them to construct a covert channel. Techniques inspired from Direct Sequence Spread Spectrum (DSSS) are used to make sure that the communication is covert and resistant to noise. We implement a prototype based on ICMP Echo (ping) to illustrate the practicality of our approach and discuss how a more complex protocol would modulate information through the use of TCP features to make communication detection very difficult. The feasibility of covert communications despite stringent traffic data retention, has far reaching policy consequences.
引用
收藏
页码:198 / 214
页数:17
相关论文
共 50 条
  • [1] Covert Communications Despite Traffic Data Retention (Transcript of Discussion)
    Danezis, George
    [J]. SECURITY PROTOCOLS XVI, 2011, 6615 : 215 - 219
  • [2] A Countermeasure for Traffic Analysis Attacks: Covert Communications With Digital Modulation
    Topal, Ozan Alp
    Kurt, Gunes Karabulut
    [J]. IEEE WIRELESS COMMUNICATIONS LETTERS, 2021, 10 (02) : 441 - 445
  • [3] Bandlimited covert data communications using zinc waveforms
    Nowak, MS
    LoCicero, JL
    Ucci, DR
    [J]. 2002 MILCOM PROCEEDINGS, VOLS 1 AND 2: GLOBAL INFORMATION GRID - ENABLING TRANSFORMATION THROUGH 21ST CENTURY COMMUNICATIONS, 2002, : 1018 - 1023
  • [4] Data retention and privacy in electronic communications
    Kotzanikolaou, Panayiotis
    [J]. IEEE SECURITY & PRIVACY, 2008, 6 (05) : 46 - 52
  • [5] Communications Data Retention in an Evolving Internet
    Brown, Ian
    [J]. INTERNATIONAL JOURNAL OF LAW AND INFORMATION TECHNOLOGY, 2011, 19 (02): : 95 - 109
  • [6] Directive 2006/24/EC on the retention of electronic communications traffic data: security v. privacy
    Vilasau, Monica
    [J]. IDP-INTERNET LAW AND POLITICS, 2006, (03):
  • [7] The retention of electronic communication traffic data
    Rodota, Stefano
    [J]. IDP-INTERNET LAW AND POLITICS, 2006, (03):
  • [8] Covert and Deniable Communications
    Anderson, Ross
    [J]. PROCEEDINGS OF THE 6TH ACM WORKSHOP ON INFORMATION HIDING AND MULTIMEDIA SECURITY (IH&MMSEC'18), 2018, : 1 - 1
  • [9] Privacy threats of data retention in internet communications
    Kotzanikolaou, Panayiotis
    Douligeris, Christos
    [J]. 2007 IEEE 18TH INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR AND MOBILE RADIO COMMUNICATIONS, VOLS 1-9, 2007, : 3990 - 3993
  • [10] Test and Analysis of Data Traffic in OPC Communications
    Yang, Mingji
    Yin, Bingzheng
    Yan, Qi
    [J]. PROCEEDINGS OF 2013 2ND INTERNATIONAL CONFERENCE ON MEASUREMENT, INFORMATION AND CONTROL (ICMIC 2013), VOLS 1 & 2, 2013, : 271 - 274