Timing channel codes for covert communication and network flow tracing
Rodrigues, Mavis
Loading…
Permalink
https://hdl.handle.net/2142/30903
Description
Title
Timing channel codes for covert communication and network flow tracing
Author(s)
Rodrigues, Mavis
Issue Date
2012-05-22T00:14:15Z
Director of Research (if dissertation) or Advisor (if thesis)
Kiyavash, Negar
Department of Study
Electrical & Computer Eng
Discipline
Electrical & Computer Engr
Degree Granting Institution
University of Illinois at Urbana-Champaign
Degree Name
M.S.
Degree Level
Thesis
Keyword(s)
covert communication
watermarking
Carrier Sense Multiple Access (CSMA)
timing channel
Abstract
The goal of this thesis is to achieve covert communication, i.e. to covertly relay information using resources that are traditionally unintended for data transmission. In a covert channel, only the sender and receiver are aware of the communication and capable of reading the transmitted message, and any other party would not be aware of the existence of this transmission. The timing channel has been studied as a medium for covert communication in a computer network. It offers the means to communicate a message by relaying information encrypted within the timings formed between consecutive packets.
This thesis covers two schemes that utilize the timing channel for covert communication -- to send a message and to trace network flows. The former, is the design of the first spyware circuit that covertly leaks spied information using an efficient encoder and for a network employing the CSMA/CA. This protocol modifies the inter-packet delays of the network flow using an exponential back-off rule. The second scheme does not relay any message but adds a signature called a watermark to enable flow tracing through the network with dependent deletion and substitution errors, and unlike earlier schemes, it is capable of withstanding desynchronization caused by packet drops. We will verify that our schemes are detectable by the receiver, and robust to the noise introduced by the network. In addition to their reliability, they are both difficult to detect and remain invisible to an observer.
Use this login method if you
don't
have an
@illinois.edu
email address.
(Oops, I do have one)
IDEALS migrated to a new platform on June 23, 2022. If you created
your account prior to this date, you will have to reset your password
using the forgot-password link below.