DocumentCode
1592437
Title
Superimposing permutational covert channels onto reliable stream protocols
Author
Levy, Jamie ; Paduch, Jaroslaw ; Khan, Bilal
Author_Institution
Dept. of Math.&Comp. Sci., CUNY, New York, NY
fYear
2008
Firstpage
49
Lastpage
56
Abstract
In this paper, we present a implicit encoding technique that makes use of lower-layer packet reordering to superimpose covert messages onto a reliable data stream. In particular, since the TCP layer provides a reliable in-order data stream over the unreliable network layerpsilas IP datagram service, we can encode covert messages by artificially permuting IP packets before they leave the source and reading the permutation at the destination prior to delivering the payload to TCP. Applying such permutations will not adversely affect TCPpsilas ability to reconstitute the transport layer data stream, since TCP is designed to be robust against out of order network layer packet delivery. We describe the design and operation of PERMEATE, an open-source covert channel toolkit which implements such a permutational covert channel over TCP, and we provide a quantitative assessment of itpsilas efficacy and efficiency as a covert channel.
Keywords
IP networks; telecommunication channels; telecommunication network reliability; telecommunication security; transport protocols; IP datagram service; PERMEATE; TCP layer; covert messages; implicit encoding technique; lower-layer packet reordering; open-source covert channel toolkit; reliable stream protocols; superimposing permutational covert channels; unreliable network layer; Decoding; Educational institutions; Open source software; Out of order; Payloads; Protocols; Robustness; TCPIP; Telecommunication traffic; Timing;
fLanguage
English
Publisher
ieee
Conference_Titel
Malicious and Unwanted Software, 2008. MALWARE 2008. 3rd International Conference on
Conference_Location
Fairfax, VI
Print_ISBN
978-1-4244-3288-2
Electronic_ISBN
978-1-4244-3289-9
Type
conf
DOI
10.1109/MALWARE.2008.4690857
Filename
4690857
Link To Document