Visible to the public Covert Channel over Network Time Protocol

TitleCovert Channel over Network Time Protocol
Publication TypeConference Paper
Year of Publication2017
AuthorsAmeri, Aidin, Johnson, Daryl
Conference NameProceedings of the 2017 International Conference on Cryptography, Security and Privacy
PublisherACM
Conference LocationNew York, NY, USA
ISBN Number978-1-4503-4867-6
Keywordscovert channel, Human Behavior, human factors, Metrics, NTP, peer to peer security, pubcrawl, resilience, Resiliency, Scalability, Storage channel, Time channel
Abstract

In this paper, we scrutinize a way through which covert messages are sent and received using the Network Time Protocol (NTP), which is not easily detected since NTP should be present in most environment to synchronize the clock between clients and servers using at least one time server. We also present a proof of concept and investigate the throughput and robustness of this covert channel. This channel will use the 32 bits of fraction of seconds in timestamp to send the covert message. It also uses "Peer Clock Precision" field to track the messages between sender and receiver.

URLhttps://dl.acm.org/doi/10.1145/3058060.3058082
DOI10.1145/3058060.3058082
Citation Keyameri_covert_2017