27.06.2013 Views

6th European Conference - Academic Conferences

6th European Conference - Academic Conferences

6th European Conference - Academic Conferences

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Hind Al Falasi and Liren Zhang<br />

transfer information secretly, where the ultimate goal of covert channels is to conceal the very<br />

existence of the communication (Zander et al., 2007).<br />

The capacity of the covert channel was analyzed as a function of buffer size and moving average size<br />

by Kang and Moskowitz (Kang and Moskowitz, 1993; 1995). The analysis was performed on a Pump<br />

that used randomized acknowledgments which are also used to control the input rate of a source. In<br />

addition, several protocols were reviewed and implemented (Kang and Moskowitz, 1993), and the<br />

proposed protocols in their work were designed to reduce the bandwidth of covert channels.<br />

3. Store and Forward Protocol (SAFP)<br />

The Store and Forward protocol is a simple protocol used for reliable communication between two<br />

networks. The protocol effectiveness is limited in minimizing the existence of covert channels.<br />

However, we use it in this paper as a benchmark to calculate the probability of a timing covert channel<br />

as the advantage of the protocol is in its simplicity to analyze.<br />

The idea behind this protocol is simple: There are two networks communicating, one network has a<br />

low security level, and the other has a high security level. There is a gateway between the two<br />

networks. The gateway does the following job: it receives a packet from the low security network,<br />

stores it in a buffer, and then sends an acknowledgment to the low security network indicating the<br />

successful receipt of that packet. The gateway then forwards the packet to the high security network<br />

and waits for an acknowledgment of receipt. If no such acknowledgment is received, the gateway<br />

retransmits the packet to the high security network. Only after the receipt of the acknowledgment<br />

does the gateway delete that packet from its buffer.<br />

All traffic from the high security network is ignored except for the acknowledgments. This notion is in<br />

accordance with the BLP security model which is a “No read up, No write down” model where up<br />

indicates an entity with high security level and down indicates an entity with low security level. The<br />

gateway forwards all data from the low security network to the high security network, and it does not<br />

forward acknowledgments from the high security network to the low security network; however, it<br />

achieves reliability of the communication by sending acknowledgments to the low security network<br />

(Figure 1).<br />

Figure 1: Store and Forward Protocol (SAFP)<br />

3.1 The covert channel<br />

The problem with the store and forward protocol is that it permits covert channels to exist between the<br />

high security network and the low security network through the acknowledgments. A timing covert<br />

channel can be established between the two networks by using the time values of the<br />

acknowledgments to signal a message from the high security network to the low security network. A<br />

high security network may send acknowledgments immediately or with some delay where the value of<br />

the delay is used to convey the message.<br />

3.2 TCP sliding window effect<br />

The SAFP notifies the low security network of the number of bytes it is willing to receive, which then<br />

becomes the low security network send window. On the other side, the high security network notifies<br />

the SAFP of the number of bytes it is willing to receive, which then becomes the SAFP send window.<br />

At first glance, the use of TCP's sliding window appears to reduce the probability of the covert channel<br />

by minimizing the number of acknowledgments. The low security network can send several packets<br />

without waiting for acknowledgments. Similarly, the high security network can acknowledge several<br />

9

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!