Robust and undetectable steganographic timing channels for i.i.d. traffic

  • Authors:
  • Yali Liu;Dipak Ghosal;Frederik Armknecht;Ahmad-Reza Sadeghi;Steffen Schulz;Stefan Katzenbeisser

  • Affiliations:
  • Department of Electrical and Computer Engineering, UC Davis;Department of Computer Science, University of California, Davis;Horst-Görtz Institute for IT-Security, Ruhr-University Bochum, Germany;Horst-Görtz Institute for IT-Security, Ruhr-University Bochum, Germany;Horst-Görtz Institute for IT-Security, Ruhr-University Bochum, Germany;Department of Computer Science, Technische Universität Darmstadt, Germany

  • Venue:
  • IH'10 Proceedings of the 12th international conference on Information hiding
  • Year:
  • 2010

Quantified Score

Hi-index 0.00

Visualization

Abstract

Steganographic timing channels exploit inter-packet delays in network traffic to transmit secret messages. The two most important design goals are undetectability and robustness. In previous proposals undetectability has been validated only against a set of known statistical methods, leaving the resistance against possible future attacks unclear. Moreover, many existing schemes do not provide any robustness at all. In this paper, we introduce a steganographic timing channel that is both robust and provably undetectable for network traffic with independent and identically distributed (i.i.d.) inter-packet delays. I.i.d. traffic models are very useful because they are simple to analyze, and constitute essential elements of many advanced network traffic models. In contrast to previous work on i.i.d. traffic we do not rely on any strong assumptions, e.g., bounded jitter, but require only the existence of a cryptographically secure pseudorandom generator. We verify the effectiveness of our approach by conducting a series of experiments on Telnet traffic and discuss the trade off between various encoding and modulation parameters.