Skip to main content
Erschienen in: Mobile Networks and Applications 4/2021

21.12.2019

A Timestamp-Regulating VoLTE Covert Channel against Statistical Analysis

verfasst von: Quanxin Zhang, Mengyan Zhu, Chen Liang, Kunqing Wang, Kai Yang, Yuanzhang Li

Erschienen in: Mobile Networks and Applications | Ausgabe 4/2021

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Covert channels are widely used for secret message transmission on networks, and they are constantly changing and updating to adapt to the new network and communication environment. There are a large number of video packets during VoLTE (Voice over LTE), which can be a suitable carrier for covert channels. In this paper, we design a secure covert storage channel for VoLTE via regulating timestamp of VoLTE packets. First, we analyze the data captured in the real environment and find out two statistical patterns for the timestamp of the video packets. Then, we build the covert channel by modifying timestamp to carry the covert message in the case of maintaining these two patterns. Finally, we simulated the covert channel using the data captured in the real environment. Experimental results show that the covertchannel can communication over VoLTE secretly and robustly with bit-rate up to 120 bit/s, and it is against statistical analysis such as the Kolmogorov-Smirnov(KS) test and linear regression.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Weitere Produktempfehlungen anzeigen
Literatur
1.
Zurück zum Zitat Lampson BW (1973) A notes on the confinement problem[J]. Commun ACM 16(10):613–615CrossRef Lampson BW (1973) A notes on the confinement problem[J]. Commun ACM 16(10):613–615CrossRef
2.
Zurück zum Zitat Fisk G, Fisk M, Papadopoulos C et al (2002) Eliminating steganography in internet traffic with active wardens[C]. In: International workshop on information hiding. Springer, Berlin, Heidelberg, pp 18–35 Fisk G, Fisk M, Papadopoulos C et al (2002) Eliminating steganography in internet traffic with active wardens[C]. In: International workshop on information hiding. Springer, Berlin, Heidelberg, pp 18–35
3.
Zurück zum Zitat Tan Y-a, Zhang X, Sharif K, Liang C, Zhang Q, Li Y (2018) Covert timing channels for IoT over mobile networks. IEEE Wirel Commun Mag 56(12):1–10CrossRef Tan Y-a, Zhang X, Sharif K, Liang C, Zhang Q, Li Y (2018) Covert timing channels for IoT over mobile networks. IEEE Wirel Commun Mag 56(12):1–10CrossRef
4.
Zurück zum Zitat Liang C, Wang X, Zhang X, Yu Z, Sharif K, Tan Y-a (2018) A payload-dependent packet rearranging covert channel for mobile VoIP traffic. Inf Sci 465:162–173CrossRef Liang C, Wang X, Zhang X, Yu Z, Sharif K, Tan Y-a (2018) A payload-dependent packet rearranging covert channel for mobile VoIP traffic. Inf Sci 465:162–173CrossRef
5.
Zurück zum Zitat Piro G, Grieco LA, Boggia G et al (2011) Simulating LTE cellular systems: an open-source framework[J]. IEEE Trans Veh Technol 60(2):498–513CrossRef Piro G, Grieco LA, Boggia G et al (2011) Simulating LTE cellular systems: an open-source framework[J]. IEEE Trans Veh Technol 60(2):498–513CrossRef
6.
Zurück zum Zitat Liu J, Kato N, Ma J et al (2015) Device-to-device communication in LTE-advanced networks: a survey[J]. IEEE Commun Surv Tutorials 17(4):1923–1940CrossRef Liu J, Kato N, Ma J et al (2015) Device-to-device communication in LTE-advanced networks: a survey[J]. IEEE Commun Surv Tutorials 17(4):1923–1940CrossRef
7.
Zurück zum Zitat Cabuk S, Brodley CE, Shields C (2004) IP covert timing channels: design and detection. Proceedings of the 11th ACM conference on computer and communications security(CCS 2004), USA Cabuk S, Brodley CE, Shields C (2004) IP covert timing channels: design and detection. Proceedings of the 11th ACM conference on computer and communications security(CCS 2004), USA
8.
Zurück zum Zitat Peng P, Ning P, Reeves DS (2006) On the secrecy of timing-based active watermarking trace-back techniques. Proceedings of the 2006 IEEE symposium on security and privacy, pp. 334–349, USA Peng P, Ning P, Reeves DS (2006) On the secrecy of timing-based active watermarking trace-back techniques. Proceedings of the 2006 IEEE symposium on security and privacy, pp. 334–349, USA
9.
Zurück zum Zitat Gianvecchio S, Wang H (2011) An entropy-based approach to detecting covert timing channels. IEEE Trans Dependable Secure Comput 8(6):785–797CrossRef Gianvecchio S, Wang H (2011) An entropy-based approach to detecting covert timing channels. IEEE Trans Dependable Secure Comput 8(6):785–797CrossRef
10.
Zurück zum Zitat Sadeghi A-R, Schulz S, Varadharajan V (2012) The silence of the LANs: efficient leakage resilience for IPsec VPNs. In: Computer security, Lecture Notes in Computer Science, vol 7459. Springer, pp 253–270 Sadeghi A-R, Schulz S, Varadharajan V (2012) The silence of the LANs: efficient leakage resilience for IPsec VPNs. In: Computer security, Lecture Notes in Computer Science, vol 7459. Springer, pp 253–270
11.
Zurück zum Zitat Rios R, Onieva JA, Lopez J (2012) HIDE_DHCP: covert communications through network configuration messages. Proceedings of the 27th IFIP TC 11 international information security conference. pp. 162–173, Greece Rios R, Onieva JA, Lopez J (2012) HIDE_DHCP: covert communications through network configuration messages. Proceedings of the 27th IFIP TC 11 international information security conference. pp. 162–173, Greece
13.
Zurück zum Zitat Do Q, Martini B, Raymond Choo KK (2015) Exfiltrating data from Android devices. Comput Secur 48(2):74–91CrossRef Do Q, Martini B, Raymond Choo KK (2015) Exfiltrating data from Android devices. Comput Secur 48(2):74–91CrossRef
14.
Zurück zum Zitat Zhang X, Liang C, Zhang Q, Li Y, Zheng J, Tan Y-a (2018) Building covert timing channels by packet rearrangement over mobile networks. Inf Sci 445-446:66–78MathSciNetCrossRef Zhang X, Liang C, Zhang Q, Li Y, Zheng J, Tan Y-a (2018) Building covert timing channels by packet rearrangement over mobile networks. Inf Sci 445-446:66–78MathSciNetCrossRef
15.
Zurück zum Zitat Zhang X, Zhu L, Wang X, Zhang C, Zhu H, Tan Y-a (2019) A packet-reordering covert channel over VoLTE voice and video traffics. J Netw Comput Appl 126:29–38CrossRef Zhang X, Zhu L, Wang X, Zhang C, Zhu H, Tan Y-a (2019) A packet-reordering covert channel over VoLTE voice and video traffics. J Netw Comput Appl 126:29–38CrossRef
16.
Zurück zum Zitat Liang C, Tan Y-a, Zhang X, Wang X, Zheng J, Zhang Q (2018) Building packet length covert channel over mobile VoIP traffics. J Netw Comput Appl 118:144–153CrossRef Liang C, Tan Y-a, Zhang X, Wang X, Zheng J, Zhang Q (2018) Building packet length covert channel over mobile VoIP traffics. J Netw Comput Appl 118:144–153CrossRef
17.
Zurück zum Zitat Lee KS, Wang H, Weatherspoon H (2014) PHY covert channels: can you see the idles? Proceedings of the 11th USENIX conference on networked systems design and implementation (NSDI 2004), pp. 1–13, USA Lee KS, Wang H, Weatherspoon H (2014) PHY covert channels: can you see the idles? Proceedings of the 11th USENIX conference on networked systems design and implementation (NSDI 2004), pp. 1–13, USA
18.
Zurück zum Zitat Radhakrishnan SV, Uluagac AS, Beyah R (2013) Realizing an 802.11-based covert timing channel using off-the-shelf wireless cards. Proceedings of 2013 IEEE global communications conference, pp. 722–728, USA Radhakrishnan SV, Uluagac AS, Beyah R (2013) Realizing an 802.11-based covert timing channel using off-the-shelf wireless cards. Proceedings of 2013 IEEE global communications conference, pp. 722–728, USA
19.
Zurück zum Zitat Li X, Zhang Y, Chong FT, Zhao BY (2011) A covert channel analysis of a real switch. Technical report. Department of Computer Science, University of California Li X, Zhang Y, Chong FT, Zhao BY (2011) A covert channel analysis of a real switch. Technical report. Department of Computer Science, University of California
20.
Zurück zum Zitat Mazurczyk W, Smolarczyk M, Szczypiorski K (2009) Retransmission steganography and its detection. Soft Comput 15(3):505–515CrossRef Mazurczyk W, Smolarczyk M, Szczypiorski K (2009) Retransmission steganography and its detection. Soft Comput 15(3):505–515CrossRef
21.
Zurück zum Zitat Zander S, Armitage G, Branch P (2007) A survey of covert channels and countermeasures in computer network protocols[J]. IEEE Commun Surv Tutorials 9(3):44–57CrossRef Zander S, Armitage G, Branch P (2007) A survey of covert channels and countermeasures in computer network protocols[J]. IEEE Commun Surv Tutorials 9(3):44–57CrossRef
23.
Zurück zum Zitat Wenger SH (2003) 264/avc over ip[J]. IEEE Trans Circuits Syst Video Technol 13(7):645–656CrossRef Wenger SH (2003) 264/avc over ip[J]. IEEE Trans Circuits Syst Video Technol 13(7):645–656CrossRef
24.
Zurück zum Zitat Schulzrinne H, Casner S, Frederick R, et al. RTP: a transport protocol for real-time applications[R]. 2003 Schulzrinne H, Casner S, Frederick R, et al. RTP: a transport protocol for real-time applications[R]. 2003
25.
Zurück zum Zitat Yu X, Tan Y-a, Zhang C, Liang C, Khaled AOURRA, Zheng J, Zhang Q (2018) A high-performance hierarchical snapshot scheme for hybrid storage systems. Chin J Electron 27(1):76–85CrossRef Yu X, Tan Y-a, Zhang C, Liang C, Khaled AOURRA, Zheng J, Zhang Q (2018) A high-performance hierarchical snapshot scheme for hybrid storage systems. Chin J Electron 27(1):76–85CrossRef
26.
Zurück zum Zitat Xue Y, Tan Y-a, Liang C, Li Y, Zheng J, Zhang Q (2018) RootAgency: a digital signature-based root privilege management agency for cloud terminal devices. Inf Sci 444:36–50MathSciNetCrossRef Xue Y, Tan Y-a, Liang C, Li Y, Zheng J, Zhang Q (2018) RootAgency: a digital signature-based root privilege management agency for cloud terminal devices. Inf Sci 444:36–50MathSciNetCrossRef
27.
Zurück zum Zitat Zhang X, Tan Y-a, Liang C, Li Y, Li J (2018) A covert channel over VoLTE via adjusting silence periods. IEEE Access 6:9292–9302CrossRef Zhang X, Tan Y-a, Liang C, Li Y, Li J (2018) A covert channel over VoLTE via adjusting silence periods. IEEE Access 6:9292–9302CrossRef
29.
Zurück zum Zitat Guan Z, Zhang Y, Wu L, Wu J, Ma Y, Hu J (2019) APPA: an anonymous and privacy preserving data aggregation scheme for fog-enhanced IoT. J Netw Comput Appl 125:82–92CrossRef Guan Z, Zhang Y, Wu L, Wu J, Ma Y, Hu J (2019) APPA: an anonymous and privacy preserving data aggregation scheme for fog-enhanced IoT. J Netw Comput Appl 125:82–92CrossRef
31.
Zurück zum Zitat Tan Y-a, Xue Y, Liang C, Zheng J, Zhang Q, Zheng J, Li Y (2018) A root privilege management scheme with revocable authorization for Android devices. J Netw Comput Appl 107(4):69–82CrossRef Tan Y-a, Xue Y, Liang C, Zheng J, Zhang Q, Zheng J, Li Y (2018) A root privilege management scheme with revocable authorization for Android devices. J Netw Comput Appl 107(4):69–82CrossRef
32.
Zurück zum Zitat Rosenberg J, Schulzrinne H (1999) An RTP payload format for generic forward error correction[R] Rosenberg J, Schulzrinne H (1999) An RTP payload format for generic forward error correction[R]
33.
Zurück zum Zitat Seber GAF, Lee AJ (2012) Linear regression analysis[M]. Wiley Seber GAF, Lee AJ (2012) Linear regression analysis[M]. Wiley
34.
Zurück zum Zitat Massey FJ Jr (1951) The Kolmogorov-Smirnov test for goodness of fit[J]. J Am Stat Assoc 46(253):68–78CrossRef Massey FJ Jr (1951) The Kolmogorov-Smirnov test for goodness of fit[J]. J Am Stat Assoc 46(253):68–78CrossRef
35.
Zurück zum Zitat Ho YS, Lin YB, Chen JC et al (2018) Voice/video quality measurement for LTE services[J]. IEEE Wirel Commun 99:1–8 Ho YS, Lin YB, Chen JC et al (2018) Voice/video quality measurement for LTE services[J]. IEEE Wirel Commun 99:1–8
37.
Zurück zum Zitat Etoh M, Yoshimura T (2005) Advances in wireless video delivery[J]. Proc IEEE 93(1):111–122CrossRef Etoh M, Yoshimura T (2005) Advances in wireless video delivery[J]. Proc IEEE 93(1):111–122CrossRef
Metadaten
Titel
A Timestamp-Regulating VoLTE Covert Channel against Statistical Analysis
verfasst von
Quanxin Zhang
Mengyan Zhu
Chen Liang
Kunqing Wang
Kai Yang
Yuanzhang Li
Publikationsdatum
21.12.2019
Verlag
Springer US
Erschienen in
Mobile Networks and Applications / Ausgabe 4/2021
Print ISSN: 1383-469X
Elektronische ISSN: 1572-8153
DOI
https://doi.org/10.1007/s11036-019-01485-3

Weitere Artikel der Ausgabe 4/2021

Mobile Networks and Applications 4/2021 Zur Ausgabe

Neuer Inhalt