JOURNAL ARTICLE

IP Covert Channel Detection

Serdar CabukCarla E. BrodleyClay Shields

Year: 2009 Journal:   ACM Transactions on Information and System Security Vol: 12 (4)Pages: 1-29   Publisher: Association for Computing Machinery

Abstract

A covert channel can occur when an attacker finds and exploits a shared resource that is not designed to be a communication mechanism. A network covert channel operates by altering the timing of otherwise legitimate network traffic so that the arrival times of packets encode confidential data that an attacker wants to exfiltrate from a secure area from which she has no other means of communication. In this article, we present the first public implementation of an IP covert channel, discuss the subtle issues that arose in its design, and present a discussion on its efficacy. We then show that an IP covert channel can be differentiated from legitimate channels and present new detection measures that provide detection rates over 95%. We next take the simple step an attacker would of adding noise to the channel to attempt to conceal the covert communication. For these noisy IP covert timing channels, we show that our online detection measures can fail to identify the covert channel for noise levels higher than 10%. We then provide effective offline search mechanisms that identify the noisy channels.

Keywords:
Covert channel Computer science Covert Channel (broadcasting) Computer network Network packet Exploit Computer security Noise (video) ENCODE Artificial intelligence

Metrics

158
Cited By
13.34
FWCI (Field Weighted Citation Impact)
53
Refs
0.99
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

Internet Traffic Analysis and Secure E-voting
Physical Sciences →  Computer Science →  Artificial Intelligence
Adversarial Robustness in Machine Learning
Physical Sciences →  Computer Science →  Artificial Intelligence
Advanced Malware Detection Techniques
Physical Sciences →  Computer Science →  Signal Processing

Related Documents

JOURNAL ARTICLE

Covert Channel Detection Methods

Adrian OndovPavol Helebrandt

Journal:   2022 20th International Conference on Emerging eLearning Technologies and Applications (ICETA) Year: 2022 Pages: 491-496
JOURNAL ARTICLE

WLAN covert timing channel detection

Hong ZhaoMinxiou Chen

Year: 2015 Pages: 1-5
JOURNAL ARTICLE

Covert channel detection using Information Theory

Loı̈c HélouëtAline Roumy

Journal:   Electronic Proceedings in Theoretical Computer Science Year: 2011 Vol: 51 Pages: 34-51
JOURNAL ARTICLE

Covert Channel Detection: Machine Learning Approaches

Muawia A. ElsadigAhmed Gafar

Journal:   IEEE Access Year: 2022 Vol: 10 Pages: 38391-38405
© 2026 ScienceGate Book Chapters — All rights reserved.