Detection Of Computational Intensive Reversible Covert Channels Based On Packet Runtime

Tobias Schmidbauer1+ and Steffen Wendzel1,2

1Fernuniversität in Hagen, 58084 Hagen, Nordrhein-Westfalen, Germany
tobias.schmidbauer@studium.fernuni-hagen.de, steffen.wendzel@fernuni-hagen.de

2Worms University of Applied Sciences, 67549 Worms, Rheinland-Pfalz, Germany
wendzel@hs-worms.de

 

 

Abstract

In current research, reversible network-level covert channels are receiving more and more attention. The restoration of the original data leaves little evidence for detection, especially if the implementation is plausibly deniable. Recently, such a channel based on one-time password hash chains has been published. The covert channel uses repeated computational intensive operations to restore a modified hash and to extract covert information transferred within. In this paper, we present an approach that observes the influence of repeated MD5, SHA2-384, SHA3-256 and SHA3-512 hash-operations on packet runtimes. Besides these hash algorithms, we also investigate whether the alphabet that the Covert Sender and the Covert Receiver agreed upon, has an influence on our detection approach. For each algorithm, we carry out three experiments with different alphabets: one without a covert channel, one with a covert channel altering all hashes, and finally, one with a covert channel altering every second hash. We further repeat each experiment ten times and define a threshold for packet runtimes without modified hashes. Also, we investigate the detectability of computational intensive reversible covert channels for all our scenarios and evaluate the detection rate depending on the number of observed packets. In addition, we describe countermeasures and limitations of our detection method and, finally, discuss application scenarios for existing network environments.

Keywords: Network Steganography, Anomaly Detection, Reversible Steganography,

Computational Intensive

 

+: Corresponding author: Tobias Schmidbauer
Faculty of Mathematics and Computer Science, Fernuniversit\"at in Hagen, 58084 Hagen, Nordrhein-Westfalen, Germany, Tel: +49-6241-509-213

 

Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA)

Vol. 13, No. 1, pp. 137-166, April 2022 [pdf]

 

Received: November 24, 2021; Accepted: February 10, 2022; Published: March 31, 2022

DOI: 10.22667/JOWUA.2022.03.31.137