CLACK: A Network Covert Channel Based on Partial Acknowledgment Encoding

被引:0
|
作者
Luo, Xiapu [1 ]
Chan, Edmond W. W. [1 ]
Chang, Rocky K. C. [1 ]
机构
[1] Hong Kong Polytech Univ, Dept Comp, Hong Kong, Hong Kong, Peoples R China
关键词
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The ability of setting up a covert channel, which allows any two nodes with Internet connections to engage in secretive communication, clearly causes a very serious security concern. A number of recent studies have indeed shown that setting up such covert channels is possible by exploiting the protocol fields in the IP, TCP, or application layer. However, the quality of these covert channels is susceptible to unpredictable network condition and active wardens. In this paper, we propose CLACK, a new covert channel which encodes covert messages into the TCP acknowledgments (ACKs). Since the message encoding is performed in a TCP data channel, CLACK is reliable and resilience to adverse network conditions. Moreover, CLACK is very difficult to detect in practice, because the TCK ACKs encoded by CLACK cannot be easily distinguished from the normal ACKs. We have implemented and tested CLACK in a test-bed to validate its correctness.
引用
收藏
页码:803 / 807
页数:5
相关论文
共 50 条
  • [31] BEHAVIOR-BASED COVERT CHANNEL IN CYBERSPACE
    Johnson, Daryl
    Lutz, Peter
    Yuan, Bo
    INTELLIGENT DECISION MAKING SYSTEMS, VOL. 2, 2010, : 311 - +
  • [32] A Novel Covert Channel Based on Length of Messages
    Ji, Liping
    Jiang, Wenhao
    Dai, Benyang
    Niu, Xiamu
    IEEC 2009: FIRST INTERNATIONAL SYMPOSIUM ON INFORMATION ENGINEERING AND ELECTRONIC COMMERCE, PROCEEDINGS, 2009, : 551 - 554
  • [33] Covert Channel Capacity Analysis Based on Entropy
    Chen, Li
    Ju, Shiguang
    Zhou, Conghua
    Zhang, Yi
    ISISE 2008: INTERNATIONAL SYMPOSIUM ON INFORMATION SCIENCE AND ENGINEERING, VOL 1, 2008, : 363 - 367
  • [34] A Proposed Covert Channel Based on Memory Reclamation
    Hussein, Omar
    Hamza, Nermin
    Hefny, Hesham
    2015 IEEE SEVENTH INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND INFORMATION SYSTEMS (ICICIS), 2015, : 343 - 347
  • [35] Ultrannel: Ultrasound based Covert Communication Channel
    Zhang, Jianyi
    Wu, Ruilong
    Li, Xiuying
    Wang, Shuo
    Jin, Qichao
    Li, Zhenkui
    Shi, Rui
    Proceedings - 2022 IEEE SmartWorld, Ubiquitous Intelligence and Computing, Autonomous and Trusted Vehicles, Scalable Computing and Communications, Digital Twin, Privacy Computing, Metaverse, SmartWorld/UIC/ATC/ScalCom/DigitalTwin/PriComp/Metaverse 2022, 2022, : 1760 - 1767
  • [36] A Typical Network Covert Timing Channel with Uniformly Distributed Noise
    Liu Xiong
    Dai Yiqi
    CHINESE JOURNAL OF ELECTRONICS, 2011, 20 (04): : 730 - 734
  • [37] Automated Covert Channel Modeling over a Real Network Platform
    Rezaei, Fahimeh
    Hempel, Michael
    Rakshit, Sushanta Mohan
    Sharif, Hamid
    2014 INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING CONFERENCE (IWCMC), 2014, : 559 - 564
  • [38] A lightweight identity authentication method by exploiting network covert channel
    Xie, Haijiang
    Zhao, Jizhong
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2015, 8 (06) : 1038 - 1047
  • [39] Research on a new network covert channel model in blockchain environment
    Li Y.
    Ding L.
    Wu J.
    Cui Q.
    Liu X.
    Guan B.
    Tongxin Xuebao/Journal on Communications, 2019, 40 (05): : 67 - 78
  • [40] A Network Covert Timing Channel Detection Method Based on Chaos Theory and Threshold Secret Sharing
    Xie, Jinpu
    Chen, Yonghong
    Wang, Linfan
    Wang, Zhe
    PROCEEDINGS OF 2020 IEEE 4TH INFORMATION TECHNOLOGY, NETWORKING, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (ITNEC 2020), 2020, : 2380 - 2384