An Entropy-based Method for Detection of Covert Channels over LTE

被引:0
|
作者
Wang, Zukui [1 ]
Huang, Liusheng
Yang, Wei
He, Zhiqiang
机构
[1] USTC, Sch CS & Tech, Hefei 230027, Anhui, Peoples R China
基金
中国国家自然科学基金;
关键词
Sequence Number; Covert Channels; Entropy; Corrected Conditional Entropy;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
With the rapid development of mobile technologies, LTE is turning to be a wonderful carrier for covert channels. Existing detection for covert storage channel (CSC) are almost packet analysis based methods. In this paper, we present an entropy-based method for detecting CSC in Sequence Number (SN) fields of PDCP and RLC layer, which is seen as the most difficult to be detected. We simulate the LTE network in NS3 platform, and propose a Protocol Data Unit (PDU) based blind method to calculate the distance between the SN of PDU and its first left neighbor, instead of analyzing the packets or extracting the value of SN from the PDU. Our experimental results have demonstrated that the proposed detection method is sensitive to the hidden information in the SN fields of PDCP and RLC layer. It can detect them in an accurate manner, and can be conducted in both real-time online and offline storage detection.
引用
收藏
页码:872 / 877
页数:6
相关论文
共 50 条
  • [21] Detection of DNS Based Covert Channels
    Sheridan, Stephen
    Keane, Anthony
    PROCEEDINGS OF THE 14TH EUROPEAN CONFERENCE ON CYBER WARFARE AND SECURITY (ECCWS-2015), 2015, : 267 - 275
  • [22] Entropy-Based Anomaly Detection in a Network
    Shukla, Ajay Shankar
    Maurya, Rohit
    WIRELESS PERSONAL COMMUNICATIONS, 2018, 99 (04) : 1487 - 1501
  • [23] An Entropy-Based Car Failure Detection Method Based on Data Acquisition Pipeline
    Kowalik, Bartosz
    Szpyrka, Marcin
    ENTROPY, 2019, 21 (04)
  • [24] A novel subspace outlier detection method by entropy-based clustering algorithm
    Zheng Zuo
    Ziqiang Li
    Pengsen Cheng
    Jian Zhao
    Scientific Reports, 13
  • [25] Detecting Covert Timing Channels Based on Difference Entropy
    Zhang Y.-F.
    Shen Y.
    Yang W.
    Xiao Y.-H.
    Huang L.-S.
    Ruan Jian Xue Bao/Journal of Software, 2019, 30 (09): : 2733 - 2759
  • [26] An Efficient Entropy-based Network Anomaly Detection Method Using MIB
    Zhao, Lei
    Wang, Fu
    PROCEEDINGS OF 2014 IEEE INTERNATIONAL CONFERENCE ON PROGRESS IN INFORMATICS AND COMPUTING (PIC), 2014, : 428 - 432
  • [27] A novel subspace outlier detection method by entropy-based clustering algorithm
    Zuo, Zheng
    Li, Ziqiang
    Cheng, Pengsen
    Zhao, Jian
    SCIENTIFIC REPORTS, 2023, 13 (01)
  • [28] Entropy-based design approach of threshold alluvial channels
    Cao, SY
    Knight, DW
    JOURNAL OF HYDRAULIC RESEARCH, 1997, 35 (04) : 505 - 524
  • [29] Entropy-based design approach of threshold alluvial channels
    Cao, Shuyou
    Knight, Donald W.
    1997, Int Assoc Hydraul Res, Delft, Netherlands (35):
  • [30] Entropy-based outlier detection using spark
    Feng, Guilan
    Li, Zhengnan
    Zhou, Wengang
    Dong, Shi
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2020, 23 (02): : 409 - 419