Swinburne
Browse

Covert channels in the IP time to live field

Download (104.95 kB)
conference contribution
posted on 2024-07-11, 20:29 authored by Sebastian Zander, Grenville Armitage, Philip BranchPhilip Branch
Covert channels are used for the secret transfer of information. Unlike encryption, which only protects the information from unauthorised observers, covert channels aim to hide the very existence of the communication. The sheer amount of data and vast number of different network protocols in the Internet makes it an ideal high-capacity vehicle for covert communication. Covert channels pose a serious security threat as criminals can use them to hide their communication activities. In this paper we present a novel covert channel inside the IP header’s Time To Live (TTL) field. The sender manipulates the TTLs of subsequent packets transmitting covert information to the receiver. Since network elements along the path also modify the TTL, the capacity and stealth of this channel depend on the 'natural' TTL variation. We analyse this variation in multiple traffic traces and propose an encoding scheme, which makes the TTL covert channel look similar to “natural” variation. We also discuss methods to eliminate and detect this covert channel.

History

Available versions

PDF (Published version)

Conference name

ATNAC 2006: Australian Telecommunication Networks and Applications Conference, Melbourne, Australia, 04-06 December 2006

Pagination

4 pp

Publisher

University of Melbourne

Copyright statement

Copyright © 2006 ATNAC Australia. The published version is reproduced with the permission of the publisher.

Language

eng

Usage metrics

    Publications

    Categories

    No categories selected

    Keywords

    Exports

    RefWorks
    BibTeX
    Ref. manager
    Endnote
    DataCite
    NLM
    DC