Files in this item

FilesDescriptionFormat

application/pdf

application/pdfRodrigues_Mavis.pdf (793kB)
(no description provided)PDF

Description

Title:Timing channel codes for covert communication and network flow tracing
Author(s):Rodrigues, Mavis
Advisor(s):Kiyavash, Negar
Department / Program:Electrical & Computer Eng
Discipline:Electrical & Computer Engr
Degree Granting Institution:University of Illinois at Urbana-Champaign
Degree:M.S.
Genre:Thesis
Subject(s):covert communication
watermarking
Carrier Sense Multiple Access (CSMA)
timing channel
Abstract:The goal of this thesis is to achieve covert communication, i.e. to covertly relay information using resources that are traditionally unintended for data transmission. In a covert channel, only the sender and receiver are aware of the communication and capable of reading the transmitted message, and any other party would not be aware of the existence of this transmission. The timing channel has been studied as a medium for covert communication in a computer network. It offers the means to communicate a message by relaying information encrypted within the timings formed between consecutive packets. This thesis covers two schemes that utilize the timing channel for covert communication -- to send a message and to trace network flows. The former, is the design of the first spyware circuit that covertly leaks spied information using an efficient encoder and for a network employing the CSMA/CA. This protocol modifies the inter-packet delays of the network flow using an exponential back-off rule. The second scheme does not relay any message but adds a signature called a watermark to enable flow tracing through the network with dependent deletion and substitution errors, and unlike earlier schemes, it is capable of withstanding desynchronization caused by packet drops. We will verify that our schemes are detectable by the receiver, and robust to the noise introduced by the network. In addition to their reliability, they are both difficult to detect and remain invisible to an observer.
Issue Date:2012-05-22
URI:http://hdl.handle.net/2142/30903
Rights Information:Copyright 2012 Mavis Rodrigues
Date Available in IDEALS:2012-05-22
Date Deposited:2012-05


This item appears in the following Collection(s)

Item Statistics