Proceedings of the 16th International Conference on Availability, Reliability and Security 2021
DOI: 10.1145/3465481.3470075
|View full text |Cite
|
Sign up to set email alerts
|

A Systematic Analysis of Covert Channels in the Network Time Protocol

Abstract: Covert channels in network protocols are a technique aiming to hide the very existence of secret communication in computer networks. In this work we present a systematic in-depth analysis of covert channels by modification for the Network Time Protocol (NTP). Our analysis results in the identification of 49 covert channels, by applying a covert channel pattern-based taxonomy. The summary and comparison based on nine selected key attributes show that NTP is a plausible carrier for covert channels. The analysis … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
3
2

Relationship

1
4

Authors

Journals

citations
Cited by 6 publications
(7 citation statements)
references
References 29 publications
0
6
0
Order By: Relevance
“…According to RFC8915 the amount of cookies is implementation-dependent. In practice, eight cookies seem to be the standard 7 to provide the client with a proper amount of cookies while at the same time avoiding UDP fragmentation. However, a deviation from this standard may raise suspicion or could trigger anomaly detection systems.…”
Section: Covert Channels In Nts Key Establishmentmentioning
confidence: 99%
See 3 more Smart Citations
“…According to RFC8915 the amount of cookies is implementation-dependent. In practice, eight cookies seem to be the standard 7 to provide the client with a proper amount of cookies while at the same time avoiding UDP fragmentation. However, a deviation from this standard may raise suspicion or could trigger anomaly detection systems.…”
Section: Covert Channels In Nts Key Establishmentmentioning
confidence: 99%
“…This resembles the Output-Feedback mode (OFB), known from block ciphers and allows to provide fresh pseudo-random IDs based on the initial secret. In Step (7) the next message chunk then gets embedded by XOR into this new UID and sent within the next NTS time request. For retrieval on the server side, the server seeds the PRNG with the shared secret 𝐾 𝑆𝑡𝑒𝑔 (8) and generates a pseudorandom ID as well.…”
Section: Nts-uid Covert Channel Design and Proof-of-conceptmentioning
confidence: 99%
See 2 more Smart Citations
“…Covert channel is a communication channel that can be used to transfer data bypassing the prohibition of the access control policies. The previous studies have proposed some methods for identifying covert channels [13][14][15] .…”
Section: Introductionmentioning
confidence: 99%