Abstract
Covert channel is an important way to transmit covert message and implement covert communication through the network. However, the existing research on covert channel cannot meet the security requirements of covert communication in the complex mobile networks. There are problems such as low transmission capacity, insufficient adaptability to network complexity, and difficulty in countering the detection of covert channels by adversaries. In this paper, we preprocess video traffics over mobile network, and extract traffic features to build a target model. We analysis traffic data by machine learning method to improve the undetectability of the covert channel. Based on the characteristics of real-time interactive communication, gray code and interval block are employed to improve the robustness of covert communication in the complex network environment. A cover channel over VoLTE video traffic, which is based on video packet reordering supported by machine learning algorithms, is proposed to realize the awareness and confrontation of detection attacks on the network side. The covert channel is built over mobile network to ensure end-to-end reliable covert communication under complex network conditions.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Mazurczyk, W., Szczypiorski, K.: Evaluation of steganographic methods for oversized ip packets. Telecommun. Syst. 49(2), 207–217 (2012)
Houmansadr, A., Borisov, N.: CoCo: coding-based covert timing channels for network flows. In: Filler, T., Pevný, T., Craver, S., Ker, A. (eds.) IH 2011. LNCS, vol. 6958, pp. 314–328. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-24178-9_22
Cabuk, S.: Network covert channels: design, analysis, detection, and elimination. Ph.D. thesis, Purdue University, West Lafayette, IN, USA (2006)
Tan, Y., Zhang, X., Sharif, K., Liang, C., Zhang, Q., Li, Y.: Covert timing channels for iot over mobile networks. IEEE Wirel. Commun. 25(6), 38–44 (2018)
Zhang, X., Liang, C., Zhang, Q., Li, Y., Zheng, J., Tan, Y.: Building covert timing channels by packet rearrangement over mobile networks. Inf. Sci. 445–446, 66–78 (2018)
Tan, Y., Xinting, X., Liang, C., Zhang, X., Zhang, Q., Li, Y.: An end-to-end covert channel via packet dropout for mobile networks. Int. J. Distrib. Sens. Netw. 14(5), 1–14 (2018)
Zhang, X., Zhu, L., Wang, X., Zhang, C., Zhu, H., Tan, Y.: A packet-reordering covert channel over volte voice and video traffics. J. Netw. Comput. Appl. 126, 29–38 (2019)
Zhang, X., Tan, Y., Liang, C., Li, Y., Li, J.: A covert channel over VoLTE via adjusting silence periods. IEEE Access 6, 9292–9302 (2018)
Zhang, Q., Gong, H., Zhang, X., Liang, C., Tan, Y.: A sensitive network jitter measurement for covert timing channels over interactive traffic. Multimed. Tools Appl. 78(3), 3493–3509 (2018). https://doi.org/10.1007/s11042-018-6281-1
Zhang, X., Guo, L., Xue, Y., Zhang, Q.: A two-way volte covert channel with feedback adaptive to mobile network environment. IEEE Access 7, 122214–122223 (2019)
Wu, J., Wang, Y., Ding, L., Liao, X.: Improving performance of network covert timing channel through huffman coding. Math. Comput. Modell. 55(1C2), 69–79 (2012)
Luo, X., Chan, E.W., Chang, R.K.: TCP covert timing channels: design and detection. In 2008 IEEE International Conference on Dependable Systems and Networks with FTCS and DCC (DSN), pp. 420–429, June 2008
Ahmadzadeh, S.A., Agnew, G.: Turbo covert channel: an iterative framework for covert communication over data networks. In: 2013 Proceedings IEEE INFOCOM, pp. 2031–2039, April 2013
Li, Y., Wang, Y., Wang, Y., Ke, L., Tan, Y.: A feature-vector generative adversarial network for evading PDF malware classifiers. Inf. Sci. 523, 38–48 (2020)
Bhuyan, M.H., Bhattacharyya, D.K., Kalita, J.K.: Network anomaly detection: methods, systems and tools. IEEE Commun. Surv. Tutor. 16(1), 303–336 (2014)
Iglesias, F., Zseby, T.: Are network covert timing channels statistical anomalies? In: Proceedings of the 12th International Conference on Availability, Reliability and Security, ARES 17 (2017)
Acknowledgment
This work has been supported by the National Natural Science Foundation of China under grant No. U1636213 and No. 61876019.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Zhang, X., Pang, L., Guo, L., Li, Y. (2020). Building Undetectable Covert Channels Over Mobile Networks with Machine Learning. In: Chen, X., Yan, H., Yan, Q., Zhang, X. (eds) Machine Learning for Cyber Security. ML4CS 2020. Lecture Notes in Computer Science(), vol 12486. Springer, Cham. https://doi.org/10.1007/978-3-030-62223-7_28
Download citation
DOI: https://doi.org/10.1007/978-3-030-62223-7_28
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-62222-0
Online ISBN: 978-3-030-62223-7
eBook Packages: Computer ScienceComputer Science (R0)