Covert channels are unforeseen and stealthy communication channels that enable manifold adversary scenarios, such as the covert exfiltration of confidential data or the stealthy orchestration of botnets. However, they can also allow the exchange of confidential information by journalists. All covert channels described until now therefore need to craft seemingly legitimate information flows for their information exchange, mimicking unsuspicious behavior. In this paper, we present DYST (Did You See That?), which represents a new class of covert channels we call history covert channels. History covert channels can communicate almost exclusively based on unaltered legitimate traffic created by regular nodes participating in a network. Only a negligible fraction of the covert communication process requires the transfer of actual covert channel information. We extend the current taxonomy for covert channels to show how history channels can be categorized. We theoretically analyze the characteristics of history channels and show how their configuration can be optimized for two channel implementations, called DYST-Basic and DYST-Ext. We further implement a proof-of-concept code for both DYST variants and evaluate the performance (robustness, detectability, and optimization) with both, simulated and real traffic. Finally, we discuss application scenarios and potential countermeasures against DYST.
翻译:隐蔽的渠道是无法预见的和隐蔽的通信渠道,它代表着一种我们称之为历史隐蔽渠道的新型隐蔽渠道。历史隐蔽渠道几乎完全可以依据参与网络的常规节点创造的未改变的合法交通来沟通。只有一小部分秘密通信过程需要实际秘密渠道信息的转移。我们扩展了目前隐蔽渠道的分类,以显示历史渠道如何分类。我们从理论上分析了历史渠道的特点,并展示了它们如何为两个频道的实施优化配置,这两个频道被称为DYST基础和DYSTExt。我们进一步为DYST变异模式以及针对真实应用(模拟、可探测性、模拟、模拟、模拟、模拟、模拟、模拟、模拟、模拟、模拟、模拟、模拟、模拟、模拟、模拟、模拟、模拟。