Al-Eidi, Shorouq and Darwish, Omar and Chen, Yuanzhu (2020) Covert Timing Channel Analysis Either as Cyber Attacks or Confidential Applications. Sensors, 20 (8). ISSN 1424-8220
[English]
PDF
- Published Version
Available under License Creative Commons Attribution Non-commercial. Download (511kB) |
Abstract
Covert timing channels are an important alternative for transmitting information in the world of the Internet of Things (IoT). In covert timing channels data are encoded in inter-arrival times between consecutive packets based on modifying the transmission time of legitimate traffic. Typically, the modification of time takes place by delaying the transmitted packets on the sender side. A key aspect in covert timing channels is to find the threshold of packet delay that can accurately distinguish covert traffic from legitimate traffic. Based on that we can assess the level of dangerous of security threats or the quality of transferred sensitive information secretly. In this paper, we study the inter-arrival time behavior of covert timing channels in two different network configurations based on statistical metrics, in addition we investigate the packet delaying threshold value. Our experiments show that the threshold is approximately equal to or greater than double the mean of legitimate inter-arrival times. In this case covert timing channels become detectable as strong anomalies.
Item Type: | Article |
---|---|
URI: | http://research.library.mun.ca/id/eprint/14865 |
Item ID: | 14865 |
Additional Information: | Memorial University Open Access Author's Fund |
Keywords: | information security, computer networks, covert timing channels, inter-arrival times, Internet of Things |
Department(s): | Science, Faculty of > Computer Science |
Date: | 24 April 2020 |
Date Type: | Publication |
Digital Object Identifier (DOI): | https://doi.org/10.3390/s20082417 |
Related URLs: |
Actions (login required)
View Item |