Cargando…
Covert Timing Channel Analysis Either as Cyber Attacks or Confidential Applications
Covert timing channels are an important alternative for transmitting information in the world of the Internet of Things (IoT). In covert timing channels data are encoded in inter-arrival times between consecutive packets based on modifying the transmission time of legitimate traffic. Typically, the...
Autores principales: | , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2020
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7219501/ https://www.ncbi.nlm.nih.gov/pubmed/32344534 http://dx.doi.org/10.3390/s20082417 |
_version_ | 1783533004448071680 |
---|---|
author | Al-Eidi, Shorouq Darwish, Omar Chen, Yuanzhu |
author_facet | Al-Eidi, Shorouq Darwish, Omar Chen, Yuanzhu |
author_sort | Al-Eidi, Shorouq |
collection | PubMed |
description | Covert timing channels are an important alternative for transmitting information in the world of the Internet of Things (IoT). In covert timing channels data are encoded in inter-arrival times between consecutive packets based on modifying the transmission time of legitimate traffic. Typically, the modification of time takes place by delaying the transmitted packets on the sender side. A key aspect in covert timing channels is to find the threshold of packet delay that can accurately distinguish covert traffic from legitimate traffic. Based on that we can assess the level of dangerous of security threats or the quality of transferred sensitive information secretly. In this paper, we study the inter-arrival time behavior of covert timing channels in two different network configurations based on statistical metrics, in addition we investigate the packet delaying threshold value. Our experiments show that the threshold is approximately equal to or greater than double the mean of legitimate inter-arrival times. In this case covert timing channels become detectable as strong anomalies. |
format | Online Article Text |
id | pubmed-7219501 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2020 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-72195012020-05-22 Covert Timing Channel Analysis Either as Cyber Attacks or Confidential Applications Al-Eidi, Shorouq Darwish, Omar Chen, Yuanzhu Sensors (Basel) Article Covert timing channels are an important alternative for transmitting information in the world of the Internet of Things (IoT). In covert timing channels data are encoded in inter-arrival times between consecutive packets based on modifying the transmission time of legitimate traffic. Typically, the modification of time takes place by delaying the transmitted packets on the sender side. A key aspect in covert timing channels is to find the threshold of packet delay that can accurately distinguish covert traffic from legitimate traffic. Based on that we can assess the level of dangerous of security threats or the quality of transferred sensitive information secretly. In this paper, we study the inter-arrival time behavior of covert timing channels in two different network configurations based on statistical metrics, in addition we investigate the packet delaying threshold value. Our experiments show that the threshold is approximately equal to or greater than double the mean of legitimate inter-arrival times. In this case covert timing channels become detectable as strong anomalies. MDPI 2020-04-24 /pmc/articles/PMC7219501/ /pubmed/32344534 http://dx.doi.org/10.3390/s20082417 Text en © 2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Article Al-Eidi, Shorouq Darwish, Omar Chen, Yuanzhu Covert Timing Channel Analysis Either as Cyber Attacks or Confidential Applications |
title | Covert Timing Channel Analysis Either as Cyber Attacks or Confidential Applications |
title_full | Covert Timing Channel Analysis Either as Cyber Attacks or Confidential Applications |
title_fullStr | Covert Timing Channel Analysis Either as Cyber Attacks or Confidential Applications |
title_full_unstemmed | Covert Timing Channel Analysis Either as Cyber Attacks or Confidential Applications |
title_short | Covert Timing Channel Analysis Either as Cyber Attacks or Confidential Applications |
title_sort | covert timing channel analysis either as cyber attacks or confidential applications |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7219501/ https://www.ncbi.nlm.nih.gov/pubmed/32344534 http://dx.doi.org/10.3390/s20082417 |
work_keys_str_mv | AT aleidishorouq coverttimingchannelanalysiseitherascyberattacksorconfidentialapplications AT darwishomar coverttimingchannelanalysiseitherascyberattacksorconfidentialapplications AT chenyuanzhu coverttimingchannelanalysiseitherascyberattacksorconfidentialapplications |