A Novel Covert Timing Channel Based on Bitcoin Messages
- 15 May 2023
- journal article
- research article
- Published by Institute of Electrical and Electronics Engineers (IEEE) in International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
- Vol. PP (00189340), 1-13
- https://doi.org/10.1109/tc.2023.3275096
Abstract
Covert channels serve the construction of cyberspace security. By realizing the secure transmission of data, it is widely used in political and financial fields. Blockchain covert channels have higher reliability and concealment compared to traditional network-based covert channels. However, existing blockchain covert storage channels need to create a large number of transactions to transmit covert information. Creating transactions requires a transation fee, which means that the implementation of blockchain covert storage channels requires a high cost. Besides, created transactions remain on-chain permanently, leading to the threat of covert information being detected. To overcome these limitations, we propose a blockchain covert timing channel framework. Specifically, we utilize inv and getdata messages in the Bitcoin transaction broadcast as carriers and propose three modulation modes to achieve covert channels without cost and leaving no trace. We evaluate the concealment of our modes by K-S, KLD tests, and machine learning approaches. Experimental results show the indistinguishability between traffic carrying covert information and normal traffic. Our channels promise a capacity of 2.4 bit/s.Keywords
This publication has 14 references indexed in Scilit:
- DLchain: A Covert Channel over Blockchain Based on Dynamic LabelsPublished by Springer Science and Business Media LLC ,2020
- Joint Transaction-Image Steganography for High Capacity Covert CommunicationPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2019
- A packet-reordering covert channel over VoLTE voice and video trafficsJournal of Network and Computer Applications, 2019
- Provably Secure Covert Communication on BlockchainCryptography, 2018
- Building covert timing channels by packet rearrangement over mobile networksInformation Sciences, 2018
- Pattern-Based Survey and Categorization of Network Covert Channel TechniquesACM Computing Surveys, 2015
- Hidden and under controlAnnals of Telecommunications, 2014
- An Entropy-Based Approach to Detecting Covert Timing ChannelsIEEE Transactions on Dependable and Secure Computing, 2010
- Provably Secure SteganographyInternational Conference on Acoustics, Speech, and Signal Processing (ICASSP), 2008
- A survey of covert channels and countermeasures in computer network protocolsIEEE Communications Surveys & Tutorials, 2007