A Comprehensive Survey on Exploring Covert Timing Channels in Network Security
PDF

How to Cite

Revathi, S., B. Praveen kumar, M. Ranjith, and M. Sachithanantham. 2024. “A Comprehensive Survey on Exploring Covert Timing Channels in Network Security”. Journal of ISMAC 6 (1): 24-38. https://doi.org/10.36548/jismac.2024.1.003.

Keywords

— Reversible Covert Timing Channel steganography
— Elliptic Curve Cryptography
— Data Encryption
— Privacy Protection
— Message Concealment
Published: 07-03-2024

Abstract

Covert timing channels play pivotal roles in spying, hacking, and data theft, enabling secret communication and surreptitious data exchange. They also find utility in secure conversations, message concealment, security testing, and privacy protection, underscoring their versatile application across diverse domains. However, the accuracy of covert timing channels may be compromised by network traffic patterns and time delays, potentially affecting data integrity. This survey paper primarily provides an brief overview of identifying and mitigating these influencing factors of existing covert timing channels and presents a suggested system that integrates Reversible Covert Timing Channel (CTC) steganography and Elliptic Curve Cryptography (ECC) to ensure secure communication and data encryption. By leveraging this combination, the system aims to enhance the resilience of covert communication channels against adversarial interference while safeguarding the confidentiality and integrity of transmitted data.

References

  1. P. Yang, X. Wan, G. Shi, H. Qu, J. Li, and L. Yang, "Identification of DNS covert channel based on stacking method,” International Journal of Computer and Communication Engineering, vol. 10, no. 2, pp. 1–15, 2021.
  2. Sattolo, Thomas AV. "Real-time detection of storage covert channels." PhD diss., Carleton University, 2021.
  3. Elsadig, Muawia A., and Ahmed Gafar. "Covert channel detection: machine learning approaches." IEEE Access 10 (2022): 38391-38405.
  4. N. Ishikura, D. Kondo, V. Vassiliades, I. Iordanov, and H. Tode, "DNS tunneling detection by cache-property-aware features," IEEE Trans. Netw. Service Manage., vol. 18, no. 2, June 2021, pp. 1203–1217.
  5. Nadler, A. Aminov, and A. Shabtai, " Detection of Malicious and Low Throughput Data Exfiltration over the DNS Protocol," Computer Security, vol. 80, January 2019, pp. 36-53.
  6. Hu, X. Huang, T. Rasheed, W. Zhang, L. and Zhao, C. (2019) ‘An Enlarging The-Capacity Packet Sorting Covert Channel’, IEEE Access, Vol.7, pp.145634–145640.
  7. Wu, Shuhong, Yonghong Chen, Hui Tian, and Chonggao Sun. "Detection of covert timing channel based on time series symbolization." IEEE Open Journal of the Communications Society 2 (2021): 2372-2382.
  8. Guo, L. Xue, Y. Zhang, Q. and Zhang, X. (2019) ‘A Two-Way VoLTE Covert Channel with Feedback Adaptive to Mobile Network Environment’, IEEE Access, Vol.7, pp.122214–122223.
  9. Tan, Y.-A. Zhang, X. Sharif, K. Li, Y. Liang, C. Zhang, Q. (2018) ‘Covert Timing Channels for IoT Over Mobile Networks’, IEEE Wireless Communication., Vol.25, No.6, pp.38–44.
  10. Deng, Dan, Xingwang Li, Shuping Dang, M. Cenk Gursoy, and Arumugam Nallanathan. "Covert communications in intelligent reflecting surface-assisted two-way relaying networks." IEEE Transactions on Vehicular Technology 71, no. 11 (2022): 12380-12385.
  11. Tian, Jing, Gang Xiong, Zhen Li, and Gaopeng Gou. "A survey of key technologies for constructing network covert channel." Security and Communication Networks 2020 (2020): 1-20.
  12. Bao, Jiaxu. "Research on the security of elliptic curve cryptography." In 2022 7th International Conference on Social Sciences and Economic Development (ICSSED 2022), pp. 984-988. Atlantis Press, 2022.
  13. Al-Eidi, S. Chen, Y. Darwish, O. and Husari, G. (2021) ‘SnapCatch: Automatic Detection of Covert Timing Channels using Image Processing and Machine Learning’, IEEE Access, Vol.9, pp.177–191.