Advertisement

Multimedia Tools and Applications

, Volume 78, Issue 3, pp 3493–3509 | Cite as

A sensitive network jitter measurement for covert timing channels over interactive traffic

  • Quanxin Zhang
  • Hanxiao Gong
  • Xiaosong Zhang
  • Chen Liang
  • Yu-an TanEmail author
Article

Abstract

In order to reflect the network transmission quality, some network state feedback mechanisms are provided in the network protocol. In the RTP, the jitter of the packet transmission delay is fed back through the jitter field in the RTCP packet. This feedback value is a very important reference data when the covert timing channel is established. However, the sending frequency of the RTCP packet is low and the feedback value of the RTCP packet are only the jitter value of the last RTP packet associated with this RTCP packet when it is sent. Therefore, the jitter feedback mechanism in the existing RTCP protocol has the problem of lack of feedback on the network state during the period between two RTCP data packets. As a result, the feedback value is highly susceptible to extreme values, which prevents it from providing an accurate numerical reference for establishing covert channels. Therefore, in this paper, a buffer was established between the last RTCP packet and the current RTCP packet. And we choose to set the interval is n RTP packets and record the corresponding position jitter value in the buffer. The data in the buffer is averaged, and the mean value is weighted and averaged with the jitter value of the current RTCP packet as a new jitter feedback value. The effect of the extreme value on the feedback value is reduced, thereby it contribute to the improvement of the feedback energy for the state of the network. In addition, the bit error rate generated by establishing a simple covert timing channel for data transmission under different network conditions is compared with the change of two jitter feedback values. It is verified that there is a positive correlation between the feedback value of the new feedback mode and the error rate. through the comparison It is verified that the new feedback method can provide a more accurate reference for the establishment of covert channels.

Keywords

Jitter RTCP Covert timing channel IPD 

Notes

Acknowledgements

This paper was supported by the National Natural Science Foundation of China (No.U1636213).

References

  1. 1.
    Al-Ayyoub M, AlzuBi S, Jararweh Y, Shehab MA, Gupta B (2016) Accelerating 3d medical volume segmentation using gpus. Multimed Tools Appl 77(4):4939–4958.  https://doi.org/10.1007/s11042-016-4218-0 CrossRefGoogle Scholar
  2. 2.
    Andreadis A, Rizzuto S, Zambon R (2016) A cross-layer jitter-based tcp for wireless networks. Eurasip J Wireless Commun Network 2016(1):191.  https://doi.org/10.1186/s13638-016-0695-0 CrossRefGoogle Scholar
  3. 3.
    Archibald R, Ghosal D (2012) A covert timing channel based on fountain codes. In: IEEE International conference on trust, security and privacy in computing and communications, pp 970–977.  https://doi.org/10.1109/TrustCom.2012.21
  4. 4.
    Atawneh S, Almomani A, Bazar HA, Sumari P, Gupta B (2017) Secure and imperceptible digital image steganographic algorithm based on diamond encoding in dwt domain. Multimed Tools Appl 76 (18):18,451–18,472.  https://doi.org/10.1007/s11042-016-3930-0 CrossRefGoogle Scholar
  5. 5.
    Biswas AK, Ghosal D, Nagaraja S (2017) A survey of timing channels and countermeasures, 50.  https://doi.org/10.1145/3023872
  6. 6.
    Cabuk S, Brodley CE, Shields C (2004) Ip covert timing channels: design and detection. In: Proceedings of the 11th ACM conference on computer and communications security, pp 178–187.  https://doi.org/10.1145/1030083.1030108
  7. 7.
    Carle G, Biersack EW (1997) Survey of error recovery techniques for ip-based audio-visual multicast applications. IEEE Netw 11(6):24–36.  https://doi.org/10.1109/65.642357 CrossRefGoogle Scholar
  8. 8.
    Chang X, Yang Y (2017) Semisupervised feature analysis by mining correlations among multiple tasks. IEEE Trans Neural Netw Learn Syst 28 (10):2294–2305.  https://doi.org/10.1109/TNNLS.2016.2582746 MathSciNetCrossRefGoogle Scholar
  9. 9.
    Chang X, Nie F, Wang S, Yang Y, Zhou X, Zhang C (2014) Compound rank-k projections for bilinear analysis. IEEE Trans Neural Netw Learn Syst 27 (7):1502–1513.  https://doi.org/10.1109/TNNLS.2015.2441735 MathSciNetCrossRefGoogle Scholar
  10. 10.
    Chang X, Nie F, Yang Y, Zhang C, Huang H (2016) Convex sparse pca for unsupervised feature learning. Acm Trans Knowl Discov Data 11(1):3:1–3,16.  https://doi.org/10.1145/2910585 CrossRefGoogle Scholar
  11. 11.
    Chang X, Ma Z, Lin M, Yang Y, Hauptmann AG (2017) Feature interaction augmented sparse learning for fast kinect motion detection. IEEE Trans Image Process 26 (8):3911–3920.  https://doi.org/10.1109/TIP.2017.2708506 MathSciNetCrossRefGoogle Scholar
  12. 12.
    Chang X, Ma Z, Yi Y, Zeng Z, Hauptmann AG (2017) Bi-level semantic representation analysis for multimedia event detection. IEEE Trans Cybern 47(5):1180–1197.  https://doi.org/10.1109/TCYB.2016.2539546 CrossRefGoogle Scholar
  13. 13.
    Chang X, Yu YL, Yang Y, Xing EP (2017) Semantic pooling for complex event analysis in untrimmed videos. IEEE Trans Pattern Anal Mach Intell 39 (8):1617–1632.  https://doi.org/10.1109/TPAMI.2016.2608901 CrossRefGoogle Scholar
  14. 14.
    Chen Z, Peng L, Gao C, Yang B, Chen Y, Li J (2017) Flexible neural trees based early stage identification for ip traffic. Soft Comput 21(8):2035–2046.  https://doi.org/10.1007/s00500-015-1902-3 CrossRefGoogle Scholar
  15. 15.
    Denby L, Landwehr JM, Mallows CL, Meloche J, Tuck J, Xi B, Michailidis G, Nair VN (2007) Statistical aspects of the analysis of data networks. Technometrics 49(3):318–334.  https://doi.org/10.1198/004017007000000290 MathSciNetCrossRefGoogle Scholar
  16. 16.
    Gianvecchio S, Wang H, Wijesekera D, Jajodia S (2008) Model-based covert timing channels: automated modeling and evasion. In: International Symposium on recent advances in intrusion detection, pp 211–230Google Scholar
  17. 17.
    Guan Z, Li J, Wu L, Zhang Y, Wu J, Du X (2017) Achieving efficient and secure data acquisition for cloud-supported internet of things in smart grid. IEEE Internet Things J 4(6):1934–1944.  https://doi.org/10.1109/JIOT.2017.2690522 CrossRefGoogle Scholar
  18. 18.
    Guan Z, Li J, Zhu L, Zhang Z, Du X, Guizani M (2017) Towards delay-tolerant flexible data access control for smart grid with renewable energy resources. IEEE Trans Indus Inform 13(6):3216–3225.  https://doi.org/10.1109/TII.2017.2706760 CrossRefGoogle Scholar
  19. 19.
    Hastyo WJ, Kang CG (2014) Lte network emulator for volte service. Nmr Biomed 22(2):191–198Google Scholar
  20. 20.
    He B, Yan S, Zhou X, Lau VKN (2017) On covert communication with noise uncertainty. IEEE Commun Lett 21(4):941–944.  https://doi.org/10.1109/LCOMM.2016.2647716 CrossRefGoogle Scholar
  21. 21.
    Huang Z, Liu S, Mao X, Chen K, Li J (2017) Insight of the protection for data security under selective opening attacks. Inform Sci 412-413:223–241.  https://doi.org/10.1016/2017.05.031 CrossRefGoogle Scholar
  22. 22.
    Imputato P, Avallone S (2018) An analysis of the impact of network device buffers on packet schedulers through experiments and simulations. Simul Model Pract Theory 80:1–18.  https://doi.org/10.1016/2017.09.008 CrossRefGoogle Scholar
  23. 23.
    Jararweh Y, Al-Ayyoub M, Fakirah M, Alawneh L, Gupta B (2017) Improving the performance of the needleman-wunsch algorithm using parallelization and vectorization techniques. Multimed Tools Appl 3:1–17.  https://doi.org/10.1007/s11042-017-5092-0 CrossRefGoogle Scholar
  24. 24.
    Jouihri Y, Guennoun Z, Chagh Y, Zahi D (2017) Towards successful volte and vowifi deployment: network function virtualization solutions benefits and challenges. Telecommun Syst 64(3):467–478.  https://doi.org/10.1007/s11235-016-0186-y CrossRefGoogle Scholar
  25. 25.
    Jung TJ, Seo KD (2016) A client-driven media synchronization mechanism for rtp packet-based video streaming. J Real-Time Image Proc 12 (2):455–464.  https://doi.org/10.1007/s11554-015-0497-3 MathSciNetCrossRefGoogle Scholar
  26. 26.
    Kumar R, Ganguly S, Izmailov R, Dan R (2006) Performance optimization of voip using an overlay network. J Non Cryst Solids 144(2):247–252Google Scholar
  27. 27.
    Li J, Li J, Chen X, Jia C, Lou W (2015) Identity-based encryption with outsourced revocation in cloud computing. IEEE Trans Comput 64(2):425–437.  https://doi.org/10.1109/TC.2013.208 MathSciNetCrossRefzbMATHGoogle Scholar
  28. 28.
    Li J, Zhang Y, Chen X, Xiang Y (2017) Preserving privacy with probabilistic indistinguishability in weighted social networks. IEEE Trans Parallel Distrib Syst 28(5):1417–1429.  https://doi.org/10.1109/TPDS.2016.2615020 CrossRefGoogle Scholar
  29. 29.
    Li J, Zhang Y, Chen X, Xiang Y, Li J, Zhang Y, Chen X, Xiang Y (2017) Secure attribute-based data sharing for resource-limited users in cloud computing. Comput Secur 72:1–12.  https://doi.org/10.1016/2017.08.007 CrossRefGoogle Scholar
  30. 30.
    Li P, Li J, Huang Z, Gao CZ, Chen WB, Chen K (2017) Privacy-preserving outsourced classification in cloud computing. Clust Comput, 1–10.  https://doi.org/10.1007/s10586-017-0849-9
  31. 31.
    Qi W, Ding W, Wang X, Jiang Y, Xu Y, Wang J, Lu K (2018) Construction and mitigation of user-behavior-based covert channels on smartphones. IEEE Trans Mob Comput 17(1):44–57.  https://doi.org/10.1109/TMC.2017.2696945 CrossRefGoogle Scholar
  32. 32.
    Qiu L, Zhang Y, Wang F, Kyung M, Mahajan HR (1985) Trusted computer system evaluation criteria. In: National Computer security centerGoogle Scholar
  33. 33.
    Rezaei F, Hempel M, Sharif H (2017) Towards a reliable detection of covert timing channels over real-time network traffic. IEEE Trans Depend Secur Comput 14(3):249–264.  https://doi.org/10.1109/TDSC.2017.2656078 CrossRefGoogle Scholar
  34. 34.
    Schulzrinne H (1995) Internet services: from electronic mail to real-time multimedia. Springer, Berlin, pp 21–34Google Scholar
  35. 35.
    Schulzrinne H, Casner S, Frederick R, Jacobson V (1996) Rtp: a transport protocol for real-time applications. Ietf Rfc 2(2):459C482Google Scholar
  36. 36.
    Shen J, Gui Z, Ji S, Shen J, Tan H, Tang Y (2018) Cloud-aided lightweight certificateless authentication protocol with anonymity for wireless body area networks. Journal of Network and Computer Applications.  https://doi.org/10.1016/j.jnca.2018.01.003
  37. 37.
    Sun L, Li Z, Yan Q, Srisa-An W, Pan Y (2017) Sigpid: significant permission identification for android malware detection. In: International Conference on malicious and unwanted software, pp 1–8.  https://doi.org/10.1109/MALWARE.2016.7888730
  38. 38.
    Szpyrka M (2013) Fast and flexible modelling of real-time systems with rtcp-nets. Comput Sci 6(5):81Google Scholar
  39. 39.
    Wang YH, Chow TH (2016) Applying patent-based fuzzy quality function deployment to explore prospective volte technologies. Int J Fuzzy Syst 18(3):424–435CrossRefGoogle Scholar
  40. 40.
    Wu Z, Xu Z, Wang H (2015) Whispers in the hyper-space: high-bandwidth and reliable covert channel attacks inside the cloud. IEEE/ACM Trans Netw 23(2):603–614.  https://doi.org/10.1109/TNET.2014.2304439 CrossRefGoogle Scholar
  41. 41.
    Xue Y, Tan YA, Liang C, Zhang C, Zheng J (2018) An optimized data hiding scheme for deflate codes. Soft Comput 22(13):4445–4455.  https://doi.org/10.1007/s00500-017-2651-2 CrossRefGoogle Scholar
  42. 42.
    Zhang X, Tan YA, Xue Y, Zhang Q, Li Y, Zhang C, Zheng J (2017) Cryptographic key protection against frost for mobile devices. Cluster Comput 20(3):2393–2402.  https://doi.org/10.1007/s10586-016-0721-3 CrossRefGoogle Scholar
  43. 43.
    Zhang X, Tan YA, Zhang C, Xue Y, Li Y, Zheng J (2018) A code protection scheme by process memory relocation for android devices. Multimed Tools Appl 77(9):11137–11157.  https://doi.org/10.1007/s11042-017-5363-9 CrossRefGoogle Scholar
  44. 44.
    Zhu H, Tan YA, Zhang X, Zhu L, Zhang C, Zheng J (2017) A round-optimal lattice-based blind signature scheme for cloud services. Futur Gener Comput Syst 73:106–114.  https://doi.org/10.1016/2017.01.031 CrossRefGoogle Scholar
  45. 45.
    Zhu R, Zhang B, Mao J, Zhang Q, Tan YA (2017) A methodology for determining the image base of arm-based industrial control system firmware. Int J Crit Infrastruct Prot 16:26–35.  https://doi.org/10.1016/2016.12.002 CrossRefGoogle Scholar
  46. 46.
    Zhu H, Tan YA, Yu X, Zhang XY, Zhu QL, Li Y (2018) An identity-based proxy signature on ntru lattice. Chinese J Electron 27(2):297–303(6).  https://doi.org/10.1049/2017.09.008 CrossRefGoogle Scholar
  47. 47.
    Zkik K, Orhanou G, Hajji SE (2017) Secure mobile multi cloud architecture for authentication and data storage IGI global.  https://doi.org/10.4018/IJCAC.2017040105

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2018

Authors and Affiliations

  • Quanxin Zhang
    • 1
  • Hanxiao Gong
    • 1
  • Xiaosong Zhang
    • 1
    • 2
  • Chen Liang
    • 1
  • Yu-an Tan
    • 1
    Email author
  1. 1.School of Science and TechnologyBeijing Institute of TechnologyBeijingChina
  2. 2.Department of Computer Science and TechnologyTangshan UniversityTangshanChina

Personalised recommendations