Please use this identifier to cite or link to this item: http://dx.doi.org/10.25673/86232
Full metadata record
DC FieldValueLanguage
dc.contributor.authorHielscher, Jonas-
dc.contributor.authorLamshöft, Kevin-
dc.contributor.authorKrätzer, Christian-
dc.contributor.authorDittmann, Jana-
dc.date.accessioned2022-06-16T10:15:42Z-
dc.date.available2022-06-16T10:15:42Z-
dc.date.issued2021-
dc.date.submitted2021-
dc.identifier.urihttps://opendata.uni-halle.de//handle/1981185920/88184-
dc.identifier.urihttp://dx.doi.org/10.25673/86232-
dc.description.abstractCovert channels in network protocols are a technique aiming to hide the very existence of secret communication in computer networks. In this work we present a systematic in-depth analysis of covert channels by modification for the Network Time Protocol (NTP). Our analysis results in the identification of 49 covert channels, by applying a covert channel pattern-based taxonomy. The summary and comparison based on nine selected key attributes show that NTP is a plausible carrier for covert channels. The analysis results are evaluated in regards to common behavior of NTP implementations in six major operating systems. Two channels are selected and implemented to be evaluated in network test-beds. By hiding encrypted high entropy data in a high entropy field of NTP we show in our first assessment that practically undetectable channels can be implemented in NTP, motivating the required further research. In our evaluation, we analyze 40,000 NTP server responses from public NTP server providers. We discuss the general approach of the research community that detection of covert channels is the more promising countermeasure, compared to active suppression of covert channels. Therefore, normalization approaches and a secure network environment are introduced.eng
dc.description.sponsorshipTransformationsvertrag-
dc.language.isoeng-
dc.relation.ispartofhttps://dl.acm.org/doi/proceedings/10.1145/3465481-
dc.rights.urihttps://creativecommons.org/licenses/by-nc-nd/4.0/-
dc.subjectNetwork Covert Channelseng
dc.subjectSteganographyeng
dc.subjectNetwork Time Protocoleng
dc.subjectNetwork Securityeng
dc.subjectNetwork Protocol Securityeng
dc.subject.ddc000-
dc.titleA systematic analysis of covert channels in the Network Time Protocoleng
dc.typeConference Object-
dc.identifier.urnurn:nbn:de:gbv:ma9:1-1981185920-881848-
local.versionTypepublishedVersion-
local.openaccesstrue-
dc.identifier.ppn176771470X-
local.bibliographicCitation.year2021-
cbs.sru.importDate2022-06-16T10:12:35Z-
local.bibliographicCitationEnthalten in ARES 2021 - New York, New York : The Association for Computing Machinery, 2021-
local.accessrights.dnbfree-
Appears in Collections:Fakultät für Informatik (OA)

Files in This Item:
File Description SizeFormat 
Hielscher et al._A systematic analysis_2021.pdfZweitveröffentlichung1.43 MBAdobe PDFThumbnail
View/Open