© 2019 IJRAR May 2019, Volume 6, Issue 2 www.ijrar.org (E-ISSN 2348-1269, P- ISSN 2349-5138)
IJRAR19K1370 International Journal of Research and Analytical Reviews (IJRAR) www.ijrar.org 513
AN OFFLINE AND EFFICIENT STORAGE
COVERT CHANNEL DETECTION MECHANISM
Vibhor Kumar Vishnoi,
Assistant Professor
Department of Computer Science & Engineering,
Roorkee College of Engineering, Roorkee, India
Abstract : A covert channel is a communication way that`s accustomed illicitly transfer data, so breaking the protection policy of a
system. A network covert channel is a covert communication by hiding covert messages into overt network packets. Any shared resource
will probably be used as a covert channel. In recent years with the development of various hiding methods, network covert channel has
become a new kind of threat for network security. A covert channel is an unintended design within legitimate communication whose
motto is to leak information as a part of rudimentary protocols. In fact, most detection systems can detect hidden data in the payload, but
struggle to cope with data hidden in the IP and TCP packet headers. The vast number of protocols on the internet seems ideal as a high-
bandwidth vehicle for covert communication. Due to unwanted and malicious nature of covert channel applications and as it poses a
serious security threat to the network, it is recommended to detect covert channels efficiently. This paper presents a review of TCP/IP
covert channel design and their detection scheme and presents a proposed method based on Naïve-Bayesian classifier to detect covert
channels in TCP ISN and IP ID fields of TCP/IP packet.
IndexTerms - TCP/IP covert channel, storage channel, Timing channel, TCP, IP, network security.
I. INTRODUCTION
Since Lampson proposed the concept of covert channel in 1973, covert channel has been taken as an important issue in the field of
information security [1]. According to Lampson “a communication channel is covert if it is neither designed nor intended to t ransfer
information at all”. Later work defines a covert channel as “a communication channel that allows a process to transfer information in a
manner that violates the system’s security policy” [2]. This definition is now more commonly accepted. Initially, covert channels were
identified as a security threat on monolithic systems i.e. mainframes but recently focus has shifted towards covert channels in computer
network protocols.
A common analogy employed for discussing the dynamics of covert communications is one known as the “prisoner’s problem” [3]. It
involves two prisoners, called here for Simplicity Alice and Bob, who need to communicate with each other in order to devise an escape
plan. It also involves a warden, Wendy, who oversees all inter-prisoner communications, and can monitor them in one of two ways:
She can examine all messages, and let them pass or deny them based on what she sees. This is a passive approach.
She can modify the message slightly to make sure it is not precisely what was sent, without changing the meaning of the message. By
modifying the message it is assumed that she might frustrate any attempt of embedding a secret message in the communication. This
is an active approach.
Ideally, the prisoners find a way to communicate which doesn’t raise suspicion from the warden. But the warden must accept that
there is a risk that some covert communication may be attempted, and pose a hypothesis of how it might function. A covert channel is
different from cryptography as its main aim is to hide the existence of transmission whereas cryptography does not hide the existence of
message but transform it in a form that is only readable by the receiver. In cryptography, there is no intention to hide communication. The
covert channel in computer network protocols and steganography are closely related but often confused. Steganography involves hiding
information in the audio, visual, or textual content. While steganography requires some form of content as a cover, covert channel
requires some network protocol as a carrier.
As network covert channels are communication channels that are not designed nor intended to exist, the communication streams must
be embedded inside authorized channels. They may be based on existing protocols from OSI low layers (e.g.: IP, TCP, UDP) to OSI high
layers (e.g.: HTTP, SMTP). The general idea of covert channels relies on the idea that information can be transferred in redundant or
unused fields of network protocols. The reliability, speed, and robustness of communication protocols allow for the implementation of
such channels over networks. Since network security analysts first started thinking about covert channel communication, two terms have
been introduced, storage and timing covert channels. In storage covert channel, one of the processes directly or indirectly writes to a
particular storage location whereas other process reads from that location. A number of tools employ TCP, IP, ICMP, and HTTP
protocols to establish storage covert channels. In these protocols, unused fields are used to transmit the information. In a way,
steganography can be seen as a form of storage covert channel. The timing covert channel involves modifying the time characteristics to
hide information. Specifically, it can be done by modulating inter-packet delays. In this paper, we pay our attention to detect covert
channels related to TCP ISN and IP ID fields.
The remainder of this paper is organized as follows. Sec. 2, provides various ways for embedding covert information in TCP/IP
protocol. Sec. 3, presents some covert channel detection mechanisms. Sec. 4 and 5 present the problem statements and the proposed
solution respectively. Sec. 6, concludes the whole paper.
II. STORAGE COVERT CHANNEL IN TCP/IP PROTOCOLS
In the next subsections, a non-exhaustive summary is given of known techniques to establish covert channels over TCP/IP protocols.
We give an estimation of the theoretical efficiency of each mechanism and provide empirical observations for some of them.