Cargando…

Covert Timing Channel Analysis Either as Cyber Attacks or Confidential Applications

Covert timing channels are an important alternative for transmitting information in the world of the Internet of Things (IoT). In covert timing channels data are encoded in inter-arrival times between consecutive packets based on modifying the transmission time of legitimate traffic. Typically, the...

Descripción completa

Detalles Bibliográficos
Autores principales: Al-Eidi, Shorouq, Darwish, Omar, Chen, Yuanzhu
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2020
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7219501/
https://www.ncbi.nlm.nih.gov/pubmed/32344534
http://dx.doi.org/10.3390/s20082417
_version_ 1783533004448071680
author Al-Eidi, Shorouq
Darwish, Omar
Chen, Yuanzhu
author_facet Al-Eidi, Shorouq
Darwish, Omar
Chen, Yuanzhu
author_sort Al-Eidi, Shorouq
collection PubMed
description Covert timing channels are an important alternative for transmitting information in the world of the Internet of Things (IoT). In covert timing channels data are encoded in inter-arrival times between consecutive packets based on modifying the transmission time of legitimate traffic. Typically, the modification of time takes place by delaying the transmitted packets on the sender side. A key aspect in covert timing channels is to find the threshold of packet delay that can accurately distinguish covert traffic from legitimate traffic. Based on that we can assess the level of dangerous of security threats or the quality of transferred sensitive information secretly. In this paper, we study the inter-arrival time behavior of covert timing channels in two different network configurations based on statistical metrics, in addition we investigate the packet delaying threshold value. Our experiments show that the threshold is approximately equal to or greater than double the mean of legitimate inter-arrival times. In this case covert timing channels become detectable as strong anomalies.
format Online
Article
Text
id pubmed-7219501
institution National Center for Biotechnology Information
language English
publishDate 2020
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-72195012020-05-22 Covert Timing Channel Analysis Either as Cyber Attacks or Confidential Applications Al-Eidi, Shorouq Darwish, Omar Chen, Yuanzhu Sensors (Basel) Article Covert timing channels are an important alternative for transmitting information in the world of the Internet of Things (IoT). In covert timing channels data are encoded in inter-arrival times between consecutive packets based on modifying the transmission time of legitimate traffic. Typically, the modification of time takes place by delaying the transmitted packets on the sender side. A key aspect in covert timing channels is to find the threshold of packet delay that can accurately distinguish covert traffic from legitimate traffic. Based on that we can assess the level of dangerous of security threats or the quality of transferred sensitive information secretly. In this paper, we study the inter-arrival time behavior of covert timing channels in two different network configurations based on statistical metrics, in addition we investigate the packet delaying threshold value. Our experiments show that the threshold is approximately equal to or greater than double the mean of legitimate inter-arrival times. In this case covert timing channels become detectable as strong anomalies. MDPI 2020-04-24 /pmc/articles/PMC7219501/ /pubmed/32344534 http://dx.doi.org/10.3390/s20082417 Text en © 2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Al-Eidi, Shorouq
Darwish, Omar
Chen, Yuanzhu
Covert Timing Channel Analysis Either as Cyber Attacks or Confidential Applications
title Covert Timing Channel Analysis Either as Cyber Attacks or Confidential Applications
title_full Covert Timing Channel Analysis Either as Cyber Attacks or Confidential Applications
title_fullStr Covert Timing Channel Analysis Either as Cyber Attacks or Confidential Applications
title_full_unstemmed Covert Timing Channel Analysis Either as Cyber Attacks or Confidential Applications
title_short Covert Timing Channel Analysis Either as Cyber Attacks or Confidential Applications
title_sort covert timing channel analysis either as cyber attacks or confidential applications
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7219501/
https://www.ncbi.nlm.nih.gov/pubmed/32344534
http://dx.doi.org/10.3390/s20082417
work_keys_str_mv AT aleidishorouq coverttimingchannelanalysiseitherascyberattacksorconfidentialapplications
AT darwishomar coverttimingchannelanalysiseitherascyberattacksorconfidentialapplications
AT chenyuanzhu coverttimingchannelanalysiseitherascyberattacksorconfidentialapplications