Asynchronous Covert Communication Using Bittorrent Trackers Mathieu Cunche, Mohamed Ali Kaafar, Roksana Boreli

Asynchronous Covert Communication Using Bittorrent Trackers Mathieu Cunche, Mohamed Ali Kaafar, Roksana Boreli

Asynchronous Covert Communication Using BitTorrent Trackers Mathieu Cunche, Mohamed Ali Kaafar, Roksana Boreli To cite this version: Mathieu Cunche, Mohamed Ali Kaafar, Roksana Boreli. Asynchronous Covert Communication Using BitTorrent Trackers. International Symposium on Cyberspace Safety and Security (CSS), Aug 2014, Paris, France. hal-01053147 HAL Id: hal-01053147 https://hal.inria.fr/hal-01053147 Submitted on 29 Jul 2014 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. Asynchronous Covert Communication Using BitTorrent Trackers Mathieu Cunche∗†, Mohamed-Ali Kaafar†‡, Roksana Boreli‡ †Inria, France ∗INSA-Lyon CITI, France ‡National ICT Australia fi[email protected][email protected] Abstract—Covert channels enable communicating parties to in a swarm (set of peers downloading and/or sharing a given exchange messages without being detected by an external ob- content). Our contributions are as follows. server. We propose a novel covert channel mechanism based We present a communication scheme that enables two on BitTorrent trackers. The proposed mechanism uses common HTTP commands, thus having the appearance of genuine web parties to perform a hidden exchange of information through traffic and consists of communications that are both indirect and the centralized BitTorrent tracker. Two inherent properties asynchronous: no messages are directly exchanged between the of the scheme are beneficial to covert communications, as sender and the receiver (of covert communications) and there is they assist with having a low detectability: the scheme is an a potentially considerable delay between the sender’s message to indirect network covert channel and it is asynchronous, with the relaying party and the receiver collecting this message. We present details of the proposed scheme in which a centralized the sending and retrieving nodes having the flexibility of not BitTorrent tracker is used for storing covert messages and needing to access the intermediate node at the same time. The evaluate its performance based on the implemented prototype. scheme includes error correction and encryption mechanisms, We analyze the detectability of covert communications by an respectively, to mitigate data losses and to provide obfuscation adversary and show that, while the common nature of the of transmitted data. Our system exploits the basic primitives BitTorrent traffic and the large number of clients make the detection unlikely, the low temporal correlation between the of the (centralized) BitTorrent tracker protocol, and therefore writer and the reader (the two communicating parties) further does not require the cooperation of the tracker. increases the detection difficulty. Based on a prototype implementation we show that our system can reliably transmit data at an average rate of 1.89 I. INTRODUCTION bits/second, and that the data remain available for dozens of minutes, providing a considerable time window in which the While the purpose of encryption is to protect the content receiver may retrieve the data. Overall these results demon- of any communication from being revealed to unauthorized strate that such a communication channel can reliably transmit parties, covert channels aim to hide the existence of the information at a rate sufficient for the exchange of small pieces communication itself. Covert channels were first described in of data (such as text messages or botnet commands) without a the context of Multi-Level Security (MLS) systems [3], as a fine-grained time synchronization between the sender and the way to communicate information from high security to low receiver. security processes. They have been subsequently extended to We analyze the detectability of our scheme, which includes the case of network communications, with their application a number of features well suited to covert communications. ranging from military and national security, where they are First, our system is solely based on one of the most commonly used to hide potential communications between parties, to used operation on the Internet, i.e. the HTTP/GET request, botnets and use by cyber criminals, that look to control remote resulting in communications having the appearance of genuine systems while circumventing traffic filtering. traffic. Second, it is asymmetric in the sense that read and write The huge amount of data exchanged through Peer-to-Peer operations are not equivalent, resulting in a distinct cost and (P2P) networks and the global-scale of P2P infrastructure cre- a detection difficulty for the sender and the receiver. ates an environment where communication has a potential to be hidden among the mass of regular users and corresponding II. CENTRALIZED BITTORRENT TRACKERS host message exchanges. These feature has been exploited BitTorrent is a Peer-to-Peer system in which peers share and to create covert communications channels [7], [4]. However download content by exchanging content chunks. BitTorrent those system, like most covert channels [5], rely on a direct rely on a centralized server called tracker, to maintain and connection between the communicating parties. distribute the list of the peers involved in a swarm (set of peers Contrarily to those works, we propose to use the P2P downloading and/or sharing a given content). Each centralized infrastructure, to build a novel asynchronous (network storage) tracker usually stores the list of peers for several contents. For covert channel that does not require the direct communica- instance, we found several millions of contents registered on tions. The key insight behind our approach is to leverage the the publicbt tracker. services provided by the BitTorrent tracking infrastructure, a The BitTorrent system uses a content identification system key element that maintains an inventory of the peers involved based on hash called infohash obtained by computing the SHA-1 digest of the content meta-information. Therefore an stored in the content table. This content table contains both infohash is a 20 bytes long (160 bits) identifier. In order to genuine entries, i.e. entries corresponding to existing torrent, obtain the list of peers connected to a swarm, a BitTorrent and hidden entries, i.e. entries added to the tracker by our client contacts a centralized tracker using an Announce re- hidden communications. To distinguish hidden entries from quest. This request can be performed through either UDP genuine ones, we use a hash-based filtering mechanism. For or HTTP protocol. In both cases the requested URL con- each piece of information stored on the tracker, the last t tains several parameters, in particular the content’s identifier: bits are a hash value of the 160 − t first bits, using a hash http://[tracker url]/announce?info hash=x. function, h(.). For the read operation, after the scrape all Upon reception of an announce request, and if the content operation has been performed, the retrieved info hash are is already registered on the tracker, the tracker returns a set of filtered. Specifically, for each info hash x, keep it only if peers and adds the requesting peer to the list. If the content h(x[0 ... 160 − t − 1]) = x[160 − t ... 160 − 1]. is not registered on the tracker, there are two possible cases This hash-based filtering approach may however induce depending on the tracker policy: either the tracker rejects the false positives, where info hash may pass the filter while they request by specifying a request for an unregistered content, or are genuine and not hidden entries. We have computed [2] that the tracker registers the content and adds the requesting peer a 4-bytes long hash (t = 32) yields to 6.67 10−5 false positives to the corresponding peer list. In the later case the tracker on the average, which we consider as a good compromise is called open, in the sense that any peer can register a new between communication overhead induced by the hash size content on the tracker by performing an announce request. and the expected number of transmission failure caused by Within the BitTorrent ecosystem, both open and non-open false positives. centralized trackers co-exist. Obfuscation through encryption: With the previous hash- Additionally, centralized BitTorrent trackers support other based filtering mechanism, the hidden info hash can be eas- requests such as the scrape-all request that provides the full list ily detected by someone knowing the algorithm. This issue of the contents registered on the tracker. A scrape-all request can be avoided by encrypting the data before it is written is performed through an HTTP/GET query on the following on the tracker, for instance with a symmetric block-cipher. url : http://[tracker url]/scrape . In order to remove the burden Indeed, only a person knowing the secret key will be able to of the scrape-all operation from the tracker itself, the corre- decrypt the retrieved info hash and filter out those that are sponding information is sometime offered by a web server. For corresponding to hidden pieces of information. In addition, instance, the publicbt tracker provides a compressed scrape this encryption provide data confidentiality and in particular file refreshed every 10 minutes at the following address : prevent an eavesdropper to recognize the hidden data in plain http://publicbt.com/all.txt.bz2. text. Note, that the key can be shared in advance, for instance III. CENTRALIZED TRACKER-BASED COVERT CHANNEL by embeding it in the core of a botnet node. DESIGN Data indexing: The size of the info hash limits the amount of In this section, we outline the design of the proposed data that can be transmitted in one entry of the content table, asynchronous cover channel.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    5 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us