Covert Communications Despite Traffic Data Retention

被引:0
|
作者
Danezis, George [1 ]
机构
[1] Microsoft Res, Cambridge, England
来源
SECURITY PROTOCOLS XVI | 2011年 / 6615卷
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We show that Alice and Bob can communicate covertly and anonymously, despite Eve having access to the traffic data of most machines on the Internet. Our protocols take advantage of small amounts of shared state that exist in many TCP/IP stacks, and use them to construct a covert channel. Techniques inspired from Direct Sequence Spread Spectrum (DSSS) are used to make sure that the communication is covert and resistant to noise. We implement a prototype based on ICMP Echo (ping) to illustrate the practicality of our approach and discuss how a more complex protocol would modulate information through the use of TCP features to make communication detection very difficult. The feasibility of covert communications despite stringent traffic data retention, has far reaching policy consequences.
引用
收藏
页码:198 / 214
页数:17
相关论文
共 50 条
  • [41] Iterative Traffic Engineering in the Data Plane of Multimedia IP Communications
    Zhang, Lilin
    Tizghadam, Ali
    Bannazadeh, Hadi
    Leon-Garcia, Alberto
    [J]. 2016 IEEE NETSOFT CONFERENCE AND WORKSHOPS (NETSOFT), 2016, : 107 - 111
  • [42] TRAFFIC DATA-ANALYSIS OF ESS TELEX COMMUNICATIONS IN GREECE
    LAMBROS, AP
    GABRIELIDIS, L
    POLATOGLOU, H
    SAKAMOTO, A
    [J]. TELECOMMUNICATION JOURNAL, 1981, 48 (02): : 91 - 94
  • [43] Data-driven Traffic Flow Analysis for Vehicular Communications
    Wang, Yang
    Huang, Liusheng
    Gu, Tianbo
    Wei, Hao
    Xing, Kai
    Zhang, Junshan
    [J]. 2014 PROCEEDINGS IEEE INFOCOM, 2014, : 1986 - 1994
  • [44] Exploring Textures in Traffic Matrices to Classify Data Center Communications
    Trois, Celio
    Bona, Luis C.
    Oliveira, Luiz S.
    Martinello, Magnos
    Harewood-Gill, Douglas
    Del Fabro, Marcos D.
    Nejabati, Reza
    Simeonidou, Dimitra
    Lima, Joao C. D.
    Stein, Benhur
    [J]. PROCEEDINGS 2018 IEEE 32ND INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA), 2018, : 1123 - 1130
  • [45] On covert throughput performance of two-way relay covert wireless communications
    Wu, Huihui
    Zhang, Yuanyu
    Liao, Xuening
    Shen, Yulong
    Jiang, Xiaohong
    [J]. WIRELESS NETWORKS, 2020, 26 (05) : 3275 - 3289
  • [46] Call admission control for voice and data traffic in wireless communications
    Leong, CW
    Zhuang, WH
    [J]. COMPUTER COMMUNICATIONS, 2002, 25 (10) : 972 - 979
  • [47] COMMUNICATIONS PROCESSORS PACE GROWTH IN DATA-NETWORK TRAFFIC
    HARDEMAN, LJ
    [J]. ELECTRONICS, 1973, 46 (11): : 89 - 96
  • [48] Robust Control of Wireless Power Transfer Despite Load and Data Communications Uncertainties
    Naghash, Reza
    Alavi, Seyed Mohammad Mahdi
    Afjei, Seyed Ebrahim
    [J]. IEEE JOURNAL OF EMERGING AND SELECTED TOPICS IN POWER ELECTRONICS, 2021, 9 (04) : 4897 - 4905
  • [49] Traffic Normalization for Covert Channel Protecting
    Frolova, Daria
    Kogos, Konstsntin
    Epishkina, Anna
    [J]. PROCEEDINGS OF THE 2021 IEEE CONFERENCE OF RUSSIAN YOUNG RESEARCHERS IN ELECTRICAL AND ELECTRONIC ENGINEERING (ELCONRUS), 2021, : 2330 - 2333
  • [50] On covert throughput performance of two-way relay covert wireless communications
    Huihui Wu
    Yuanyu Zhang
    Xuening Liao
    Yulong Shen
    Xiaohong Jiang
    [J]. Wireless Networks, 2020, 26 : 3275 - 3289