ON THE FRACTAL CHARACTERISTICS OF NETWORK TRAFFIC AND ITS UTILIZATION IN COVERT COMMUNICATIONS



Similar documents
Observingtheeffectof TCP congestion controlon networktraffic

Internet Traffic Variability (Long Range Dependency Effects) Dheeraj Reddy CS8803 Fall 2003

Examining Self-Similarity Network Traffic intervals

Burst (of packets) and Burstiness

Network Performance Measurement and Analysis

Analysis of VDI Workload Characteristics

Connection-level Analysis and Modeling of Network Traffic

Accelerated Simulation Method for Power-law Traffic and Non- FIFO Scheduling

Time Series Analysis of Network Traffic

Department of Electrical and Computer Engineering Ben-Gurion University of the Negev. LAB 1 - Introduction to USRP

Measurement and Modelling of Internet Traffic at Access Networks

Connection-level Analysis and Modeling of Network Traffic

RESEARCH OF THE NETWORK SERVER IN SELF-SIMILAR TRAFFIC ENVIRONMENT

Application Layer Traffic Analysis of a Peer-to-Peer System

PHASE ESTIMATION ALGORITHM FOR FREQUENCY HOPPED BINARY PSK AND DPSK WAVEFORMS WITH SMALL NUMBER OF REFERENCE SYMBOLS

Network traffic: Scaling

LCMON Network Traffic Analysis

A New Look at an Old Tool the Cumulative Spectral Power of Fast-Fourier Transform Analysis

ANALYZING NETWORK TRAFFIC FOR MALICIOUS ACTIVITY

Introduction to acoustic imaging

Image Compression through DCT and Huffman Coding Technique

SOFTWARE FOR GENERATION OF SPECTRUM COMPATIBLE TIME HISTORY

NRZ Bandwidth - HF Cutoff vs. SNR

Bandwidth-dependent transformation of noise data from frequency into time domain and vice versa

Network Performance Monitoring at Small Time Scales

Round-Trip Time Inference Via Passive Monitoring

EVALUATION OF LOAD BALANCING ALGORITHMS AND INTERNET TRAFFIC MODELING FOR PERFORMANCE ANALYSIS. Arthur L. Blais

Signal Processing Methods for Denial of Service Attack Detection

G.Vijaya kumar et al, Int. J. Comp. Tech. Appl., Vol 2 (5),

Spectrum Level and Band Level

Characterizing Wireless Network Performance

The Effect of Network Cabling on Bit Error Rate Performance. By Paul Kish NORDX/CDT

Workload Generation for ns. Simulations of Wide Area Networks

Analog and Digital Signals, Time and Frequency Representation of Signals

A Frequency-Based Approach to Intrusion Detection

Final Year Project Progress Report. Frequency-Domain Adaptive Filtering. Myles Friel. Supervisor: Dr.Edward Jones

Bluetooth voice and data performance in DS WLAN environment

Rapid Prototyping of a Frequency Hopping Ad Hoc Network System

Internet Management and Measurements Measurements

Effects of Interrupt Coalescence on Network Measurements

ESTIMATION OF TOKEN BUCKET PARAMETERS FOR VIDEOCONFERENCING SYSTEMS IN CORPORATE NETWORKS

CoMPACT-Monitor: Change-of-Measure based Passive/Active Monitoring Weighted Active Sampling Scheme to Infer QoS

NETWORK REQUIREMENTS FOR HIGH-SPEED REAL-TIME MULTIMEDIA DATA STREAMS

Chapter 3 ATM and Multimedia Traffic

Log-Likelihood Ratio-based Relay Selection Algorithm in Wireless Network

Lab 1. The Fourier Transform

Introduction to time series analysis

A Sound Analysis and Synthesis System for Generating an Instrumental Piri Song

Traffic Modelling for Fast Action Network Games

RANDOM VIBRATION AN OVERVIEW by Barry Controls, Hopkinton, MA

Probability and Random Variables. Generation of random variables (r.v.)

Hybrid Lossless Compression Method For Binary Images

SIGNAL PROCESSING FOR EFFECTIVE VIBRATION ANALYSIS

CSE3214 Computer Network Protocols and Applications. Chapter 1 Examples and Homework Problems

Broadband Networks. Prof. Dr. Abhay Karandikar. Electrical Engineering Department. Indian Institute of Technology, Bombay. Lecture - 29.

Whitepaper n The Next Generation in Wireless Technology

Non-Data Aided Carrier Offset Compensation for SDR Implementation

AN Application Note: FCC Regulations for ISM Band Devices: MHz. FCC Regulations for ISM Band Devices: MHz

SIMPLIFIED PERFORMANCE MODEL FOR HYBRID WIND DIESEL SYSTEMS. J. F. MANWELL, J. G. McGOWAN and U. ABDULWAHID

Metrol. Meas. Syst., Vol. XVII (2010), No. 1, pp METROLOGY AND MEASUREMENT SYSTEMS. Index , ISSN

IP Traffic Aggregation: Headroom Needed for QOS and Application to TDM transport

Applications. Network Application Performance Analysis. Laboratory. Objective. Overview

Effects of Filler Traffic In IP Networks. Adam Feldman April 5, 2001 Master s Project

Electronic Communications Committee (ECC) within the European Conference of Postal and Telecommunications Administrations (CEPT)

The Calculation of G rms

Characteristics of Network Traffic Flow Anomalies

Timing Errors and Jitter

Data Networks Summer 2007 Homework #3

Continuous One-Way Available Bandwidth Change Detection in High Definition Video Conferencing

Assignment #3 Routing and Network Analysis. CIS3210 Computer Networks. University of Guelph

Controller Design in Frequency Domain

A Passive Method for Estimating End-to-End TCP Packet Loss

A Study of Internet Packet Reordering

Jitter Measurements in Serial Data Signals

Voice Over IP Traffic - A Review of this Paper

MANAGING QUEUE STABILITY USING ART2 IN ACTIVE QUEUE MANAGEMENT FOR CONGESTION CONTROL

Introduction. Impact of Link Failures on VoIP Performance. Outline. Introduction. Related Work. Outline

Using Linear Fractal Interpolation Functions to Compress Video. The paper in this appendix was presented at the Fractals in Engineering '94

A Statistically Customisable Web Benchmarking Tool

PERFORMANCE OF THE GPRS RLC/MAC PROTOCOLS WITH VOIP TRAFFIC

Measuring Line Edge Roughness: Fluctuations in Uncertainty

Transcription:

ON THE FRACTAL CHARACTERISTICS OF NETWORK TRAFFIC AND ITS UTILIZATION IN COVERT COMMUNICATIONS Rashiq R. Marie Department of Computer Science email: R.R.Marie@lboro.ac.uk Helmut E. Bez Department of Computer Science email: h.e.bez@lboro.ac.uk Jonathan M. Blackledge Department of Electronic and Electrical Engineering email: jon.blackledge@ukf.net S. Datta Department of Electronic and Electrical Engineering S.Datta@lboro.ac.uk ABSTRACT There are many models in the literature that consider the main characteristics of Internet traffic noise either by processing the real measurements of traffic in the time- or frequency-domain. In this paper we use the latter approach and introduce a novel method to capture the fractal behavior of Internet traffic in which we adopt a random scaling fractal model to simulate the self-affine characteristics of the Internet In this paper we utilize the self-affine nature of Internet traffic in order to disguise the transmission of a digital file by splitting the file into a number of binary blocks (files) whose size and submission times are compatible with the bursty lengths of Internet We shall examine two different time series. The Sizes series consists of the actual packet sizes as individual packet arrive, and the inter-arrival series consists of timestamps differences between consecutive packets. KEYWORDS: FRACTALS,SELF-AFFINTY, INTERNET TRAFFIC, COVERT TRANSMISSION TECHNIQUES,POWER SPECTRUM 1 Introduction There are several empirical and analytical studies of Internet traffic data from networks, including Eathrnet Local- Area Networks (LAN) [1], Wide Area Network (WAN) [2], World Wide Web (WWW) data transfer [3] and other communication systems that have all convincingly demonstrated the presence of self-affine characteristics. Self-affinity and self-similarity are properties we associate with fractals - objects that appears the same regardless of the scale at which they are viewed. With Internet data, this it manifested in the absence of a natural length of a burst ; at every time scale, ranging from a few milliseconds to minutes and hours, bursts occur that consist of sub-periods separated by less bursty sub-periods. The commonly assumed models for network traffic date (e.g. the Poisson model) do not fit the statistical characteristics of Internet traffic data, primarily because these models are not able to capture the fractal behavior of Internet There are many models in the literature that consider the main characteristics of Internet traffic noise either by processing the real measurements of traffic in the time- or frequency-domain. In this work we use the latter approach and introduce a novel method to capture the fractal behavior of Internet traffic in which we adopt the Random Scaling Fractal model, RSF (q), to simulate the self-affine characteristics of the Internet The relevance and validation of the proposed model are demonstrated by application of studies for measured Internet traffic obtained at the campus network of Loughborough University captured using the tcpdump utility. Among all the possible traffic characteristics, our work focuses on two properties: packet size in bytes and packet inter-arrival time. For the application to securing data transmission through the Internet, instead of attaching a complete file (encrypted or otherwise) at a given time, we first encrypt the file (using Crypstic TM ) and then split a binary representation of the file into a number of blocks. Each block is then saved as a sequence of binary files whose size is determined by the fractal characteristics of the Internet through which the data is to transmitted using our proposed model. At the same time, a sequence of interarrival times are generated using the same model. The data is then applied to the Internet as e-mail attachments and submitted according to the sequence of interarrival times computed. The recipient of the data recovers the information by concatenating the files sequence.

To our knowledge, this approach is the first of its kind to use the self-affine nature of Internet traffic in order to disguise the transmission of a digital file by splitting the file into a number blocks (files) whose size and submission times are compatible with the bursty lengths of Internet The rest of this paper is organized as follows: In section 2 we present the description of the data set used in this work. Section 3 provides the characterization of the Internet traffic using fractal model. In setion 4 we present the estimation of fractal parametr for internet properties.in section 5 we present the covert transfer of data through the Internet. Finaly, in section 6 we conclude with the main results. 2 Network Traffic Measurement The data set used for this study was a collection of observations made of a network in aplace at Loughborough University in March, 2006. Among all the possible traffic characteristics, our work has focused on two properties: packet size and packet inter-arrival times. The measurements were made over the course of about one hour, and recorded all packets arriving at or originating from the host site on Mar 30 2006, at 10:30 AM (LU-trace) [4]. self-similar or self-affine; they look the same in stochastic sense at different scale. RSF noise are characterized by power spectra whose frequency distribution is proportional to 1/ω q where ω is the frequency and q > 0 is the Fourier Dimension, a value that is simply relate to the Fractal Dimension, D and Hurst(Dimension) parameter H. The relationship between the q, H and D is given by q = H + 1/2 = (5 2D)/2 This power law describes the convenetial RSF models which based on stationary processes in which the statistics of the RSF signals are invariant of time and the value of q is constant. It is known that the Hurst parameter(dimension) H measures the features of self-affinity of time series in real-time domain. Herein, we present the description of these features through processing the time series in the frequency domain in which we assume that the power spectrum of this signal is dominated by a RSF model P (ω) = c/ω q, where c > 0 Assume X(t), in time domain, be a time series of the In- The used measurements represent the number of bytes that arrived over the server at the Computing Services Dept. and the corresponding timestamps for their arriving. The data in its original formate was at the scale of 1µsc. We aggregated this data to resolve at different time scales 1 sec, o.1 sec, 0.01 sec, and 0.001 sec for computational convenience. The resulting time series array with the number bytes that arrived in each time interval is considered as the set of observations in this work. 3 Characterization of Internet Traffic Noise using a Fractal Model Fractals are applicable when the underlying process being mathematically modeled have a similar appearance regardless of the time or observation scale. It turns out that much of the traffic riding the Internet can be modeled using fractals [5]. In this section we introduce a novel method depending on the frequency analysis by which we try to capture the fractal behavior of Internet traffic in which we adopt a Random Scaling Fractal, RSF(q), model to characterize the self-affine characteristic of the Internet 3.1 Random Scaling Fractal Noise Many noise signals observed in nature are random fractals. Random Scaling Fractal noise (RSF) are signals whose probability distribution function or PDF has the same shape irrespective of the scale over which they are observed. So that, random fractal noises are statistically Figure 1. Internet bytes traffic over four different time scales; upper left: 1000 ms, upper right: 100 ms, lower left: 10 ms, and lower right: 1 ms ternet bytes traffic or packets inter-arrival times which to be assume a self-affine signal, (see Figure 1 and Figure 2 ). The power spectrum of such signal can be written as P (ω) = X(ω) 2, where X(ω) is Fast Fourier Transform (FFT) of the time series in frequency domain ( i.e. X(ω) = f f t(x(t))). For such time series the power spectrum,p (ω) obeys the RSF model P (ω) = c ω q Figure 3 show example of different plots of the measured power spectrum of Internet bytes traffic over four different time units. Figure 4 shows the plot of measured power

Figure 2. Inter-arrival times of packets Figure 4. Measured power spectrum of packets interarrival times, from top to bottom and from left to right: (q=0.08),(q=0.15),(q=0.19) and (q=0.11) or F (ω i ) 2 = ˆP (ω i ) = c ω i q If we consider the error function E(q, c) = [ln P (ω i ) ln ˆP (ω i )] 2 Figure 3. Measured power spectrum of bytes traffic, from top to bottom and from left to right: 1sec (q=0.45), 100ms (q=0.28), 10ms (q=0.10) and 1ms (q=0.15) spectrum of packet inter-arrival times. These figures give the evident that the power spectrum of the time series signal of internet traffic obeys the RSF model. However, we can characterize the behavior of Internet traffic through estimating the parameter q in the proposed model where the estimated values of this parameter will reflect the degree of self-similarity(fractality) in real internet To do this,and in the following section, we apply the Least Square Method on the measurements of Internet traffic that is described in Section 2. 3.2 Power Spectrum Method Let X i, i = 1, 2, 3,..., N (N being a power of 2) be an aggregated time series that represent the number of bits, bytes that occurred in a predefined unit time, this unit time may 1 sec, 100 msec, 10 msec, or 1msec. Consider the case in which the digital power spectrum P i P (ω i ) is given by applying a FFT to this time series. This data can be approximated by F (ω i ) = c ω i q 2 = [ln P (ω i ) C + q ln ω i ] 2 where C = ln c, and it is assumed that the spatial frequency ω i > 0 and the measured power spectrum P (ω i ) > 0, i then the solutions of equations (least square method) E q = 0 and E C = 0 gives and N N (ln ω i ) ln P (ω i ) ( N ln ω i )( N ln P (ω i ) q = ( N ln ω i ) 2 N N (ln ω i ) 2 C = 1 N ln P (ω i ) + q N ln ω i Since the power spectrum of real signals of size N is symmetric about the DC level, where the DC level is taken to the mid point N 2 + 1 of the array, so in practice we consider only N 2 of data that lie to the right of DC. [7] 4 Estimation of Fractal Parameter for Packets Sizes and Inter-arrivals times The two main properties of network packets are their sizes in bytes and their inter-arrival times ( timestamp differences between consecutive packets). and both of them are

Figure 5. Estimating Fourier Dimension Figure 6. Generation of a synthetic fractal trace. obey to the Random Scaling FractalRSF (q) model. To estimate the fractal parameter in theses series we convert them to frequency domain in which we assumed that the empirical power spectrum of each series has an envelop Power Spectrum Density Function (PSDF) which given as the RSF model P (ω) = ω q. By using Moving Window technique, we choose a window of size N = 1024 to move over the points of the time series according to the given time unit. From each window segment we apply the PSM to estimate the Fourier Dimension q, after implementing normalizing and transformation to spectral domain on the given segment. Figure 5 shows the block diagram of the estimation method of the parameter q. Table 1 and Table 2 gives the results of estimation of q form the packet sizes for over different time scales and packet inter-arrival times, respectively. From these results we note as the time resolution increases then the value of q decreases. Wind. No. 1 ms 10 ms 100 ms 1 s Byte Byte Byte Byte 1 0.07 0.02 0.25 0.77 2 0.10 0.17 0.26 0.58 3 0.10 0.10 0.18 0.74 Table 1. The estimated values of q, on different time scales Wind. No. 1 2 3 4 5 est(q) 0.14 0.26 0.10 0.11 0.17 Table 2. The estimated values of q for packet Inter-arrival series 5 Covert Transfer of data through the Internet In this section we introduce the method of using the fractal characteristics of internet traffic to camouflage the transfer of a digital file through the Internet. For applications to securing data transmission through the Internet, instead of attaching a complete file (encrypted or otherwise) at a given Figure 7. The mechanisim of sending a digital file over the Internet. time, we split a binary representation of the file into a number of blocks. Each block is then saved as a sequence (a trace)of binary files in which the statistical characteristics of such traces fit with the characteristics of the actual trace of Internet packets. The sizes of the split files are determined by the fractal characteristics of the Internet through which the data is transmitted using the Random Scaling Fractal model. At the same time, a sequence of inter-arrival times are generated using the same model. This sequence is used to formulate the required timestamps. The data is then applied to the Internet as e-mail attachments and submitted according to the sequence of timestamps computed(see Figure 7). The recipient of the data recovers the information by concatenating the files sequence. 5.1 Synthetic Generation of a Fractal Traffic Trace The method of generating a synthetic traffic trace for the purpose of securely transferring a set of files as e-mail attachments is considered. In this way, we generate synthetic trace or sample path that exhibit the same statistical properties as the measured The points of the sample path represent the sizes in bits of the split files. In general, this method of generating a synthetic trace with fractal characteristics depends on generating white Gaussian noise that is filtered using the Random Scaling Fractal

model with a suitable value of the parameter q. To ensure that the synthetic trace is representative of a trace that is likely to be encountered in the real world, the synthetic trace is used the estimated values of q from the captured traces of actual Internet The inputs to the method are q, the desired Fourier dimension, and N, the desired number of points in the synthesized sample, (where N is a power of 2). Here, the parameter q takes a value from the table of estimated values or it may take the average of these values. Similarly, the synthetic sequence of inter-arival times is generated which used to produce the timestamps in military form. Figure 6 shows the block diagram of the generation a synthetic fractal trace. 6 Conclusion We studied the sereis of byte counts on different aggregation level of 1 sec, 0.1 sec, 0.01 sec and 0.001 sec. and the sequence of packets inter-arrival times. The analysis of our trace demonestrated that the Internet traffic appeared to agree with the finding of previous studies, shwoing that fractal characteristics of internet For application of sending a digital file through the Internet we introduced a novel approach in which the fractal characteristics of internet traffic have been considered, in a way, that the synthetic trace of split files fit the actual trace of internet Indeed, to our knowledge, this approach is the first of its kind to use the self-affine nature of Internet traffic in order to camouflage the transmission of a digital file by splitting the file into a number blocks (files) whose size and submission times are compatible with the bursty lengths of Internet [6] E. Marke, M. Crovella and A. Bestavors, Explaining World Wide Web traffic Self-similarity, Technical Report TR-95-015., Boston University, Computer Scinece Department,1995. [7] M. Turner, J. M. Blackledge and P. Andrew, Fractal Geometry in Digital Imaging, (UK: Academic Press Ltd., 1998). [8] W. Willinger and V. Paxson, Where Mathematics meets the Internet,Notices of the American Mathematical Society, 45(8), 1998, 961-970. [9] D. Chakraborty, A. Ashir, G. Suganuma, K. Mansfield, T.Roy and N. Shiratori, Self-similar and fractal nature of Internet traffic, International Journal of Network Management, 14(2), 2004, 119-129. [10] Liu Shu-Gang, Wang Pei-Jin and Qu Lin-Jie, Modelling and simulation of self-similar data traffic, Proc. of the 4th International conference on machine learning Cyberetics, Guangzhou, 2005, 18-21 [11] Bo R. and Lowen S., Fractal traffic models for Internet simulation, Proc. of fifth IEEE Symposium (ISCC 2000)2000, 200-206. [12] Paxson V., Fast approximation of self-similar network traffic, Lawrence Berkeley National Lab., Tech. Rep., LBL- 36750, Berkeley, USA, Apr. 1995. 7 References [1] W. Leland, M. Taqqu, W. Willinger, and D. Wilson, On the Self-Similar Nature of Ethernet Traffic (Extended Version), IEEE/ACM Transactions on Networking, 2(1), 1994, 1-15. [2] V. Paxon and S. Floyd, Wide-area traffic: The failure of Poisson modeling, IEEE/ACM Transactions on Networking, 3(3), 1995, 226-244. [3] M. E. Crovella and A. Bestavros, Self-similarity in World Wide Web traffic: Evidence and possible causes, IEEE/ACM Transactions on networking, 5(6), 1997, 835-846. [4] The internet traffic archive, Personal communication with Network manager at Computing Services Department/, 2006. [5] J. M. Blackledge, Digital Signal Processing:Mathematical and Computation Methods, Software Development and Applications, ( London: Horwood Publishing Limited, 2nd Edition, 2006).