Please use this identifier to cite or link to this item:
Title: A combinatorial approach to network covert communications with applications in web leaks
Authors: Luo, X 
Zhou, P
Chan, EWW
Chang, RKC 
Lee, W
Keywords: Internet
Channel capacity
Combinatorial mathematics
Security of data
Issue Date: 2011
Publisher: IEEE
Source: 2011 IEEE/IFIP 41st International Conference on Dependable Systems & Networks (DSN), 27-30 June 2011, Hong Kong, p. 474-485 How to cite?
Abstract: Various effective network covert channels have recently demonstrated the feasibility of encoding messages into the timing or content of individual network objects, such as data packets and request messages. However, we show in this paper that more robust and stealthy network covert channels can be devised by exploiting the relationship of the network objects. In particular, we propose a combinatorial approach for devising a wide spectrum of covert channels which can meet different objectives based on the channel capacity and channel undetectability. To illustrate the approach, we design WebLeaks and ACKLeaks, two novel covert channels which can leak information through the data and acknowledgment traffic in a web session. We implement both channels and deploy them on the PlanetLab nodes for evaluation. Besides the channel capacity, we apply the state-of-the-art detection schemes to evaluate their camouflage capability. The experiment results show that their capacity can be boosted up by our combinatorial approach, and at the same time they can effectively evade the detection.
ISBN: 978-1-4244-9232-9
978-1-4244-9231-2 (E-ISBN)
ISSN: 1530-0889
DOI: 10.1109/DSN.2011.5958260
Appears in Collections:Conference Paper

View full-text via PolyU eLinks SFX Query
Show full item record


Last Week
Last month
Citations as of Sep 13, 2018

Page view(s)

Last Week
Last month
Citations as of Sep 17, 2018

Google ScholarTM



Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.