4 research outputs found
On Identities in Modern Networks
Communicating parties inside computer networks use different kind of identifiers. Some of these identifiers are stable, e.g., logins used to access a specific service, some are only temporary, e.g., dynamically assigned IP addresses. This paper tackles several challenges of lawful interception that emerged in modern networks. The main contribution is the graph model that links identities learnt from various sources distributed in a network. The inferred identities result into an interception of more detailed data in conformance with the issued court order. The approach deals with network address translation, short-lived identifiers and simultaneous usage of different identities. The approach was evaluated to be viable during real network testing based on various means to learn identities of users connected to a network
A NOVEL APPROACH FOR COVERT COMMUNICATION OVER TCP VIA INDUCED CLOCK SKEW
The goal of this thesis is to determine the feasibility and provide a proof of concept for a covert
communications channel based on induced clock skew. Transmission Control Protocol (TCP) timestamps
provide a means for measuring clock skew between two hosts. By intentionally altering timestamps, a host
can induce artificial clock skew as measured by the receiver, thereby providing a means to covertly
communicate. A novel scheme for transforming symbols into skew values is developed in this work, along
with methods for extraction at the receiver. We tested the proposed scheme in a laboratory network
consisting of Dell laptops running Ubuntu 16.04. The results demonstrated a successful implementation of
the proposed covert channel with achieved bit rates as high as 33 bits per second under ideal conditions.
Forward error correction was also successfully employed in the form of a Reed–Solomon code to mitigate
the effects of variation in delay over the Internet.Lieutenant, United States NavyApproved for public release; distribution is unlimited