practical data hiding technique in covert timing channels

4
@ IJTSRD | Available Online @ www ISSN No: 245 Inte R Practical data hidin M. Gokul N Departme G.K.M. College of Eng ABSTRACT Out of order arrival of packets is phenomenon on the Internet. Applicatio can degrade to a great extent due to arrival of packets Packet reordering phenomenon on the Internet. Moreover transparently from the user and ap processes. In this paper, we propose a channel technique using the pack phenomenon as a host for car communications. This makes it an attra to exploit for sending hidden signals to dynamically manipulating packet order flow. In our approach, specific per successive packets are selected to reliability of the channel, while t distribution of their usage is tuned stealthiness by imitating real Internet tra expensive for the adversary to discov channel due to the tremendous overhead sort the packets among huge amount o traffic. A simple tool is implemented t this new channel. We studied ex robustness and capabilities of our prop using both simulation and experimentat varieties of traffic characteristics. The capacity of this technique have show results. We also investigated a practic for distorting and potentially preventing channels. Keywords: Packet Sequence, d transference, Covert timing chan communications w.ijtsrd.com | Volume – 2 | Issue – 2 | Jan-Feb 56 - 6470 | www.ijtsrd.com | Volum ernational Journal of Trend in Sc Research and Development (IJT International Open Access Journ ng technique in Covert timing Narayanan, PS. Lokesh, N. Kanimozhi ent of Computer Science and Engineering, gineering and Technology, Chennai, Tamil Nadu an inevitable on performance o out-of-order is a common r, it is handled pplication-level a novel covert ket reordering rrying secret active medium o receivers by r in a network rmutations of enhance the the frequency d to increase affic. It is very ver the covert d to buffer and of background to demonstrate xtensively the posed channel tion over large reliability and wn promising cal mechanism g similar novel data hiding nnel, Secrete I. INTRODUCTION In the past few years, the In include millions of users thousands of applications usin However, data transmissio characterized by being visi available to anyone to collec protection techniques focus on rather than hiding the existen The adversary can easily find the information. The adversar an observation points or moni easily detect presence of chan packets are transmitted over t order. We propose a techn unconventional channel of p covert communication mediu small amount of information’ information is called packet unique number for each pac encoded using base64 algori block used to transmit a pa shuffle and then placed in th block will contain shuffled p possible paths to reach the des block to Destination. Source d to the same path. Each block Source generates a codeword order of packet’s unique num codeword sends in another c send only code word not a bl out-of-order packets. The d packet using these codeword. all blocks from the source and 2018 Page: 1631 me - 2 | Issue 2 cientific TSRD) nal channels u, India nternet has exploded to communicating with ng hundreds of protocols. on has been always ible, in the open and ct and analyse. All data n protecting the payload nce of the channel itself. the channel and recover ry just randomly places itor at random times and nnel in the network. All the internet in sequence nique that can use the packet order to be our um. User data split into ’s. This small amount of t. The Source provides cket. These packets are ithm. Source creates a acket. The packets are he blocks so that every packets. Source finds all stination. Source sends a does not send all blocks sends in different path. d for all bocks. Original mber is called codeword. channel and the channel lock. All blocks contain destination arranges the The destination receives d these blocks are travel

Upload: ijtsrd

Post on 12-Aug-2019

21 views

Category:

Education


0 download

DESCRIPTION

Out of order arrival of packets is an inevitable phenomenon on the Internet. Application performance can degrade to a great extent due to out of order arrival of packets Packet reordering is a common phenomenon on the Internet. Moreover, it is handled transparently from the user and application level processes. In this paper, we propose a novel covert channel technique using the packet reordering phenomenon as a host for carrying secret communications. This makes it an attractive medium to exploit for sending hidden signals to receivers by dynamically manipulating packet order in a network flow. In our approach, specific permutations of successive packets are selected to enhance the reliability of the channel, while the frequency distribution of their usage is tuned to increase stealthiness by imitating real Internet traffic. It is very expensive for the adversary to discover the covert channel due to the tremendous overhead to buffer and sort the packets among huge amount of background traffic. A simple tool is implemented to demonstrate this new channel. We studied extensively the robustness and capabilities of our proposed channel using both simulation and experimentation over large varieties of traffic characteristics. The reliability and capacity of this technique have shown promising results. We also investigated a practical mechanism for distorting and potentially preventing similar novel channels. M. Gokul Narayanan | PS. Lokesh | N. Kanimozhi "Practical data hiding technique in Covert timing channels" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-2 , February 2018, URL: https://www.ijtsrd.com/papers/ijtsrd10777.pdf Paper URL: http://www.ijtsrd.com/engineering/computer-engineering/10777/practical-data-hiding-technique-in-covert-timing-channels/m-gokul-narayanan

TRANSCRIPT

Page 1: Practical data hiding technique in Covert timing channels

@ IJTSRD | Available Online @ www.ijtsrd.com

ISSN No: 2456

InternationalResearch

Practical data hiding technique in Covert timing channels

M. Gokul Narayanan,Department of Computer Science and Engineering,

G.K.M. College of Engineering and Technology

ABSTRACT

Out of order arrival of packets is an inevitable phenomenon on the Internet. Application performance can degrade to a great extent due to outarrival of packets Packet reordering is a common phenomenon on the Internet. Moreover,transparently from the user and applicationprocesses. In this paper, we propose a novel covert channel technique using the packet reordering phenomenon as a host for carrying secret communications. This makes it an attractive medium to exploit for sending hidden signals to receivers by dynamically manipulating packet order in a network flow. In our approach, specific permutations of successive packets are selected to enhance the reliability of the channel, while the frequency distribution of their usage is tuned to increase stealthiness by imitating real Internet traffic. It is very expensive for the adversary to discover the covert channel due to the tremendous overhead to buffer and sort the packets among huge amount of background traffic. A simple tool is implemented to demonstrate this new channel. We studied extensively the robustness and capabilities of our proposed channel using both simulation and experimentation over large varieties of traffic characteristics. The reliability acapacity of this technique have shown promising results. We also investigated a practical mechanism for distorting and potentially preventing similar novel channels. Keywords: Packet Sequence, data hiding transference, Covert timing channel, Secrete communications

@ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 2 | Jan-Feb 2018

ISSN No: 2456 - 6470 | www.ijtsrd.com | Volume

International Journal of Trend in Scientific Research and Development (IJTSRD)

International Open Access Journal

Practical data hiding technique in Covert timing channels

M. Gokul Narayanan, PS. Lokesh, N. Kanimozhi Department of Computer Science and Engineering,

G.K.M. College of Engineering and Technology, Chennai, Tamil Nadu

Out of order arrival of packets is an inevitable phenomenon on the Internet. Application performance can degrade to a great extent due to out-of-order arrival of packets Packet reordering is a common phenomenon on the Internet. Moreover, it is handled transparently from the user and application-level processes. In this paper, we propose a novel covert channel technique using the packet reordering phenomenon as a host for carrying secret communications. This makes it an attractive medium to exploit for sending hidden signals to receivers by dynamically manipulating packet order in a network flow. In our approach, specific permutations of successive packets are selected to enhance the reliability of the channel, while the frequency

tion of their usage is tuned to increase stealthiness by imitating real Internet traffic. It is very expensive for the adversary to discover the covert channel due to the tremendous overhead to buffer and sort the packets among huge amount of background

affic. A simple tool is implemented to demonstrate this new channel. We studied extensively the robustness and capabilities of our proposed channel using both simulation and experimentation over large varieties of traffic characteristics. The reliability and capacity of this technique have shown promising results. We also investigated a practical mechanism for distorting and potentially preventing similar novel

Packet Sequence, data hiding transference, Covert timing channel, Secrete

I. INTRODUCTION

In the past few years, the Internet has exploded to include millions of users communicating with thousands of applications using hundreds of protocols. However, data transmission hacharacterized by being visible, in the open and available to anyone to collect and analyse. All data protection techniques focus on protecting the payload rather than hiding the existence of the channel itself. The adversary can easily find tthe information. The adversary just randomly places an observation points or monitor at random times and easily detect presence of channel in the network. All packets are transmitted over the internet in sequence order. We propose a technique that can use the unconventional channel of packet order to be our covert communication medium. User data split into small amount of information’s. This small amount of information is called packet. The Source provides unique number for each packeencoded using base64 algorithm. Source creates a block used to transmit a packet. The packets are shuffle and then placed in the blocks so that every block will contain shuffled packets. Source finds all possible paths to reach the desblock to Destination. Source does not send all blocks to the same path. Each block sends in different path. Source generates a codeword for all bocks. Original order of packet’s unique number is called codeword. codeword sends in another channel and the channel send only code word not a block. All blocks contain out-of-order packets. The destination arranges the packet using these codeword. The destination receives all blocks from the source and these blocks are travel

Feb 2018 Page: 1631

www.ijtsrd.com | Volume - 2 | Issue – 2

Scientific (IJTSRD)

International Open Access Journal

Practical data hiding technique in Covert timing channels

Chennai, Tamil Nadu, India

In the past few years, the Internet has exploded to include millions of users communicating with thousands of applications using hundreds of protocols. However, data transmission has been always characterized by being visible, in the open and available to anyone to collect and analyse. All data protection techniques focus on protecting the payload rather than hiding the existence of the channel itself. The adversary can easily find the channel and recover the information. The adversary just randomly places an observation points or monitor at random times and easily detect presence of channel in the network. All packets are transmitted over the internet in sequence

technique that can use the unconventional channel of packet order to be our covert communication medium. User data split into small amount of information’s. This small amount of information is called packet. The Source provides unique number for each packet. These packets are encoded using base64 algorithm. Source creates a block used to transmit a packet. The packets are shuffle and then placed in the blocks so that every block will contain shuffled packets. Source finds all possible paths to reach the destination. Source sends a block to Destination. Source does not send all blocks to the same path. Each block sends in different path. Source generates a codeword for all bocks. Original order of packet’s unique number is called codeword.

nother channel and the channel send only code word not a block. All blocks contain

order packets. The destination arranges the packet using these codeword. The destination receives all blocks from the source and these blocks are travel

Page 2: Practical data hiding technique in Covert timing channels

International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470

@ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 2 | Jan-Feb 2018 Page: 1632

in different channel. Some channel contains more noises so packets are easily loss. Some channel contains very less noise so no loss of packets. Block travel in noise channel the loss some packets that block reach a destination. The destination will find an error. The destination indicates to the source. The source resends a message in low noise path.

II. RELATED WORKS A Marcus Völp, Claude-Joachim Hamann and Hermann Härtig (2008) are designed a practically feasible modification to fixed-priority schedulers allows to avoid timing channels despite threads having access to precise clocks. Tarun Banka ,Abhijit A. Bare and Anura P.Jayasumana Out of order arrival of packets is an inevitable phenomenon on the Internet. Sharad Jaiswal, Gianluca Iannaccone, Christophe Diot, Jim Kurose and Don Towsley (2003)are described Measurement and Classification of Out-of-Sequence Packets in a Tier-1 IP Backbone. Myong H. Kang, Ira S. Moskowitz and Daniel C. Lee used MULTI-LEVEL SECURE (MLS)system stores and processes information of different sensitivity levels in a secure manner. Xenofon Fafoutis, Evgeny Tsimbalo and Robert Piechocki (2014) the project was used to Timing Channels in Bluetooth Low Energy. Nischal M. Piratla and Anura P. Jayasumana

project concept is Reordering of packets due to multipath forwarding an analysis. Steven J. Murdoch and Stephen Lewis (2005) are explained the method Embedding Covert Channels into TCP/IP. Ang Chen,W. Brad Moore and Hanjun Xiao (2013) implemented the concept of Detecting Covert Timing Channels with Time-Deterministic Replay. L. Gallucio,

G. Morabito, and S. Palazzo, “Exploiting timing channels in intra-body sensor networks,”, in Proc. IEEE Global Commun.(2012)

III. PROPOSED SYSTEM The project proposes a technique that can use the unconventional the covert channel from the huge amount of background traffic. If the adversary just randomly channel of packet order to be our covert communication medium. By manipulating the order of packets sent over the network at the sender-side, we emulate the packet reorder phenomenon which takes place naturally. And project is used to the secure communications of data by encoding the packets using the Base64 algorithm.

Fig. 1 Architecture diagram

Page 3: Practical data hiding technique in Covert timing channels

International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456

@ IJTSRD | Available Online @ www.ijtsrd.com

A. Network formation and Packet Generation Phase

In this module, create a network formation. We consist multi-hop network contains number of nodes. Each node has some range. The nodecommunicate its range. Any one node range intersect with another node range it define both are neighboOne node can have more number of neighbours. The destination is not a neighbour of source can’t send information directly to the destination. It information to its neighbour and the neighbour send an information to another neighbour and then finally ireaches to destination. Source find a path to reach destination.

Fig. 2

C. Data transmission phase

Source finds all possible paths to reach the destination. Source sends a block to Destination. send all blocks to the same path. Each block sends in different path. Source generates a codeword for all bocks. Original order of packet’s unique number is called codeword. codeword sends in another channel and the channel send only code word not a block. All blocks contain outfrom all possible channel and also receive a codeword. The destination decodes an all packets using base64 algorithm and arrange the packet using these codeword

International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456

Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 2 | Jan-Feb 2018

Network formation and Packet Generation Phase

In this module, create a network formation. We hop network contains number of nodes.

Each node has some range. The node can communicate its range. Any one node range intersect with another node range it define both are neighbour. One node can have more number of neighbours. The destination is not a neighbour of source can’t send information directly to the destination. It sends an information to its neighbour and the neighbour send an information to another neighbour and then finally it

find a path to reach

B. Encoding and shuffling packets

In this module, user information is not directly send to the destination. User data split into small amount of information’s. These small amount of information is called packet. If the original information is needed, will arrange the packets. But data split into n number of packet. It is difficult to arrange the original order. So the source provides a unique number for each packet. The source transmits a packet in the overt channel the adversary can easily detect the overt channel and recover the data from the channel. The source executes some techniques to avoid these problem. The data convert into packets and the source provide a unique number of each packets then each packet encodes using base64 algorithm. Source creates a blocks. The block contains particularof packets. The packets are arranged in block out of order manner.

Working of Base64 Algorithm

Source finds all possible paths to reach the destination. Source sends a block to Destination. send all blocks to the same path. Each block sends in different path. Source generates a codeword for all bocks. Original order of packet’s unique number is called codeword. codeword sends in another channel and the

ord not a block. All blocks contain out-of-order packets. Destination receives a blocks from all possible channel and also receive a codeword. The destination decodes an all packets using base64 algorithm and arrange the packet using these codeword.

Fig. 4 Data transmission

International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470

Feb 2018 Page: 1633

Encoding and shuffling packets

mation is not directly send to the destination. User data split into small amount of information’s. These small amount of information is called packet. If the original information is needed, will arrange the packets. But data split into n number

It is difficult to arrange the original order. So the source provides a unique number for each packet. The source transmits a packet in the overt channel the adversary can easily detect the overt channel and recover the data from the channel. The

xecutes some techniques to avoid these problem. The data convert into packets and the source provide a unique number of each packets then each packet encodes using base64 algorithm. Source creates a blocks. The block contains particular amount

The packets are arranged in block out of

Fig. 3

Source finds all possible paths to reach the destination. Source sends a block to Destination. Source does not send all blocks to the same path. Each block sends in different path. Source generates a codeword for all bocks. Original order of packet’s unique number is called codeword. codeword sends in another channel and the

order packets. Destination receives a blocks from all possible channel and also receive a codeword. The destination decodes an all packets using base64

Page 4: Practical data hiding technique in Covert timing channels

International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456

@ IJTSRD | Available Online @ www.ijtsrd.com

D. Data Recovery Phase

The destination receives all blocks from the source and these blocks are travel in different channel. Some channel contains more noises so packets are easily loss. Some channel contains very less noise so no loss of packets. Block travel in noise channel the loss some packets that block reach a destination. The destination will find an error. The destination indicates to the sourceresends a message in low noise path. The destination decodes all packets using base64 algorithm and arrange the original order of these packets using codeword.

TABLE 1: Effect of prevention power on error rate of Covert channel

Conclusions In this paper, we pursue the possibility of building covert channels that use the packet order as the medium for transmitting hidden signals. Packet reordering is a normal behaviour in the Internet and it is too hard to closely monitor and unlikely to raise suspicions. Moreover, efforts to eliminate it will not be easily implemented due to high cost and lack of incentive. Also, the main causes behind this phenomenon are not likely to vanish nor decrease in the near future. Our proposed channel is designed based on the idea of assigning different symbols to the different permutations a number of consecutive packets can have. By using only, a subset of the permutations, we were able to add error detection and correction capabilities. Subsets used are rotated to evade detection. Any adversary needs a huge cost to detect the covert channel due to the tremendous overhead to buffer and sort the packets among huge amount of background traffic. The code words themselves are selected based on the traffic characteristics to follow closely the innate reordering characteristics of the host channel.

.

International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456

Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 2 | Jan-Feb 2018

The destination receives all blocks from the source and these blocks are travel in different channel.

noises so packets are easily loss. Some channel contains very less noise so no loss of packets. Block travel in noise channel the loss some packets that block reach a destination. The destination will find an error. The destination indicates to the source. The source resends a message in low noise path. The destination decodes all packets using base64 algorithm and arrange the original order of these

Effect of prevention power on error rate of Covert channel

In this paper, we pursue the possibility of building covert channels that use the packet order as the

transmitting hidden signals. Packet reordering is a normal behaviour in the Internet and it is too hard to closely monitor and unlikely to raise suspicions. Moreover, efforts to eliminate it will not be easily implemented due to high cost and lack of

tive. Also, the main causes behind this phenomenon are not likely to vanish nor decrease in

Our proposed channel is designed based on the idea of assigning different symbols to the different permutations a number of consecutive

have. By using only, a subset of the permutations, we were able to add error detection and correction capabilities. Subsets used are rotated to evade detection. Any adversary needs a huge cost to detect the covert channel due to the tremendous

buffer and sort the packets among huge amount of background traffic. The code words themselves are selected based on the traffic characteristics to follow closely the innate reordering

REFERENCES 1) El-Atawy, A., Duan, Q. and Al

A novel class of robust covert channels using outof-order packets. IEEE Transactions on Dependable and Secure Computingpp.116-129..

2) M. Allman and E. Blanton. “On Making TCP More Robust to Packet Reordering”, ACM Computer Communication Review, 32(1), January 2002.

3) Piratla, N. M., Jayasumana, A. P., and Banka, T., "On Reorder Density and its Application to Characterization of Packet Reordering," Proc. 30th IEEE Local Computer Networks Conference (LCN 2005), Sydney, Australia, Nov. 2005

4) Y. Liu, D. Ghosal, F. Armknecht, A. Sadeghi, S. Schulz, and S. Katzenbeisser, “Robust and undetectable steganographic timingi.i.d. traffic,” in Proc. 12th Int. Conf. Inf. Hiding, Berlin, Germany, 2010, pp. 193

5) S. Jaiswal, G. Iannaccone, C. Diot, J. Kurose, and D. Towsley. Measurement and classification of out-of-sequence packets in a tierTechnical Report 02-17, Computer Science Dept., UMass Amherst, May 2002.

6) W. Hu, “Reducing timing channels with futime,” in Proc. IEEE Comput. Soc. Symp. Res. Security Priv., 1991, pp. 8

7) A. Houmansadr and N. Borisov, “Coco: Codingbased covert timing channels for network flows,” in Proc. 13th Int. Conf. Inf. Hiding, 2011, pp. 314–328.

8) R. Piechocki and D. Sejdinovic, “Combinatorial channel signature modulation for wireless adnetworks,” in Proc. IEEE Int. Conf.(ICC), June 2012, pp. 4684

9) S. Cabuk, C. E. Brodley, and C. Shields, “Ip covert channel detection,” ACM Trans.Security, vol. 12, no. 4, pp. 22:12009.

10) S. Voloshynovskiy and F. Deguillaume, “Information-theoretic dataachievements and open problems,” Int. J. Image Graph., vol. 5, no. 1, pp. 1

11) S. H. Sellke, C. Wang, S. Bagchi, and N. B. Shroff, “TCP/IP timing Channels: Theory to Implementation,” in Proc. IEEE INFOCOM, 2009, pp. 2204–2212.

International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470

Feb 2018 Page: 1634

uan, Q. and Al-Shaer, E., 2017. A novel class of robust covert channels using out-

IEEE Transactions on Dependable and Secure Computing, 14(2),

M. Allman and E. Blanton. “On Making TCP More Robust to Packet Reordering”, ACM Computer Communication Review, 32(1),

Piratla, N. M., Jayasumana, A. P., and Banka, T., "On Reorder Density and its Application to Characterization of Packet Reordering," Proc. 30th IEEE Local Computer Networks Conference

Australia, Nov. 2005.

Y. Liu, D. Ghosal, F. Armknecht, A. Sadeghi, S. Schulz, and S. Katzenbeisser, “Robust and undetectable steganographic timing channels for i.i.d. traffic,” in Proc. 12th Int. Conf. Inf. Hiding, Berlin, Germany, 2010, pp. 193–207.

Jaiswal, G. Iannaccone, C. Diot, J. Kurose, and D. Towsley. Measurement and classification of

sequence packets in a tier-1 ip backbone. 17, Computer Science

Dept., UMass Amherst, May 2002.

W. Hu, “Reducing timing channels with fuzzy time,” in Proc. IEEE Comput. Soc. Symp. Res.

, 1991, pp. 8–20.

A. Houmansadr and N. Borisov, “Coco: Coding-based covert timing channels for network flows,” in Proc. 13th Int. Conf. Inf. Hiding, 2011, pp.

D. Sejdinovic, “Combinatorial channel signature modulation for wireless ad-hoc networks,” in Proc. IEEE Int. Conf. Commun. (ICC), June 2012, pp. 4684–4689.

S. Cabuk, C. E. Brodley, and C. Shields, “Ip covert channel detection,” ACM Trans. Inf. Syst. Security, vol. 12, no. 4, pp. 22:1– 22:29, Apr.

S. Voloshynovskiy and F. Deguillaume, theoretic data-hiding: Recent

achievements and open problems,” Int. J. Image vol. 5, no. 1, pp. 1–31, 2005.

S. H. Sellke, C. Wang, S. Bagchi, and N. B. Shroff, “TCP/IP timing Channels: Theory to Implementation,” in Proc. IEEE INFOCOM,