Simulation and Evaluation of Jitter and Packet Loss Noises Influence on Covert Timing Channel Performance

Authors

1 Master's student, Imam Hossein University

2 Assistant Professor, Imam Hossein University

Abstract

Covert timing channels are used in transmitting information in a secret way. Jitter and packet loss are
two important noises that affect Covert Timing Channel performance. Several studies on evaluating
capacities and robustness of covert channels were done, but all those were based on measurement in real
environment or computational methods. Measurement in real environment and computational methods do
not have the capacity of creating special circumstances and evaluating the channel in those circumstances.
In the present research, a covert timing channel on the Internet consisting two packet losses and jitter noises
was simulated using Petri-Net. Also, capacity and robustness criteria of channel were evaluated. The results
of the simulation showed that weibull distribution function to modeling HTTP traffic transmitter, laplacian
distribution function to modeling network jitter and bernoulli distribution function to modeling packet loss
are careful enough. Also, parameters of these models obtained to optimum capacity and robustness.

Keywords


[1] A. E. Cha and J. Krim. ( 2001) Terrorists' Online Methods
Elusive U.S. Agencies Seek Experts' Help in Tracing Encrypted
Messages. 14 .
[2] K. Eaton, "Deep Inside Alleged Russian Spies," Tech and
Techniques, 2010.
[3] K. Borders and A. Prakash, "Towards Quantification of
Network-Based Information Leaks Via HTTP," USENIX
Workshop on Hot Topics in Security, vol. 3, 2008.
[4] W. Security, "WhiteHat Website Security Statistic Report,"
2013.
[5] V. D. Gligor, "A Guide to Understanding Covert Channel
Analysis of Trusted Systems," National Computer Security
Center, Meade, Maryland, NCSC-TG-030, 1993.
[6] R. A. Kemmerer, "Shared resource matrix methodology: A
practical approach to identifying covert channels," ACM
Transactions on Computer Systems, vol. 1, pp. 2, 277-56, 1983.
[7] R. J. Walls, K. Kothari, and M. Wright, "Liquid: A detectionresistant
covert timing channel based on IPD shaping," Elsevier
Computer Networks, vol. 55, pp. 1217-1228, 2011.
[8] S. Gianvecchio and H. Wang, "Detecting covert timing channels:
an entropy-based approach," in CCS'07: Proceedings of the 14th
ACM conference on Computer and Communications Security,
NY, USA, 2007, pp. 307-316.
[9] S. Gianvecchio, H. Wang, D. Wijesekera, and S. Jajodia,
"Model-Based Covert Timing Channels: Automated Modeling
and Evasion," in Proceedings of Recent Advances in Intrusion
Detection (RAID) Symposium, 2008.
[10] S. H. Sellke, C.C. Wang, S. Bagchi, and N. B. Shroff, "Covert
TCP/IP Timing Channels: Theory to Implementation," in
Proceedings of the 28th Conference on Computer
Communications (INFOCOM), 2009.
[11] X. Zi, L. Yao, L. Pan, and J. Li, "Implementing a passive
network covert timing channel," Elsevier computers & security,
pp. 686–696, 2010.
[12] S. Zander, "Performance of Selected Noisy Covert Channels and
Their Countermeasures in IP Networks," PhD Thesis, Centre for
Advanced Internet Architectures Faculty of Information and
Communication Technologies, Swinburne University of
Technology, Melbourne, 2010.
[13] A. HoumanSadr, "Design, Analysis, and Implementation of
Effective Network flow Watermarking Schemes," PhD Thesis,
Illinois Urbana-Champaign, 2012.
[14] E. J. Daniel, C. M. White, and K. A. Teague, "An Inter-arrival
Delay Jitter Model using Multi-Structure Network Delay
Characteristics for Packet Networks," presented at the 37th
Asilomar Conference on Signal, Systems, and Computers, New
York, 2003.
[15] L. R. Domínguez, D. T. Roman, D. M. Rodríguez, and C. V.
Rosales, "Jitter in IP Networks: A Cauchy Approach," IEEE
COMMUNICATIONS LETTERS, vol. 14, 2010.
[16] Z. pi, E. Kwon, D. Kim, and D. Kim, "Forward link voip packet
delay jitter model," Samsung Electronics Co. C30-20060719-
006, 2006.
[17] T. K. Bandhopadhya, M. Saxena, and A. Tiwari, "Jitter’s Alpha
Stable Distribution Behavior," Computer Technology and
Electronics Engineering (IJCTEE), vol. 3, 2013.
[18] A. Abdolazimi, M. Mohamadi, B. N. Sharif, and A. Akbari,
"Combination of several methods for the recovery of lost packets
and its application in distributed speech recognition," presented
at the the Third International Conference on Information and
Knowledge Technology, Ferdowsi University of Mashhad, 2007.
[19] T. I. Association, "Network Model for Evaluating Multimedia
Transmission Performance Over Internet Protocol," vol. PN-3-
0062-RV1, ed. to be published as ANSI/TIA 921 A, 2007.
[20] I. Cisco Systems, "Packet Loss Model," vol. TR41.3.3/00-02-
005, ed: Ram Jagadeesan, 2000.
[21] R. Flynn and E. Jones, "Robust distributed speech recognition in
noise and packet loss conditions," Digital Signal Processing, pp.
1559-1571, 2010.
[22] J. Mochinac, P. Kocan, and B. Hruˇsovsk, "Packet loss
modeling," in proceedings of The 10th Scientific Conference of
Young Researchers, Kosice Slovakia, 2010.
[23] A. Flo, "User-Perceived Quality of Service in Video on Demand
Services," Master of Science, Department of Telematics,
University of Science and Technology, Norwegian, 2006.
Volume 2, Issue 3 - Serial Number 3
February 2020
Pages 35-49
  • Receive Date: 25 April 2014
  • Revise Date: 04 July 2023
  • Accept Date: 19 September 2018
  • Publish Date: 22 November 2014