An Application Layer Covert Channel: Information Hiding With Cha ng
نویسندگان
چکیده
The purpose of our project was the implementation of an application-layer covert channel, with guaranteed con dentiality via cha ng. A covert channel is a means of passing information between two parties in such a manner that the existence of the communication channel itself is not obvious to the casual observer. Additionally, the implementation of a covert channel is enhanced through encryptionless security { through clever uses of steganography in the covert channel itself, even if an observer is aware that a covert channel exists, he will not be able to recover the information which is being sent across the channel. The proposed covert channel achieves privacy through cha ng and winnowing, an alternative to encryption which instead pads useful (\wheat") bits with garbage (\cha ") bits, such that only the intended receiver will be able to determine which bits are wheat and which are cha . The goal of this project was to create a practical covert channel, such that even an active, capable administrator or observer would nd it very di cult or be very unlikely to detect the channel. Even after detecting the channel and possibly recovering the data, the administrator should still be unable to understand the transmitted message. A covert channel can be described as a type of communication channel operating such that it can be utilized to somehow violate system security policy. A covert channel is not part of the actual computer system design; rather, the channel serves as a means of transmitting a stream of bits from the sender to receiver in such a way that the very existence of a communication channel cannot be veri ed without full knowledge of the channel details. [7] Covert channels have a number of applications. Information can be transmitted secretly in a number of ways. Common ideas include through process table information, over networks (local and wide), through les. Covert channels are often implemented at the transport layer. In the case of TCP/IP, it is fairly trivial to develop applications such as those described below. [11]
منابع مشابه
Detection And Elimination Of Covert Communication In Transport And Internet Layer – A Survey
Covert channels use stealth communications to compromise the security policies of systems. They constitute an important security threat since they can be used to exfiltrate confidential data from networks. TCP/IP protocols are used everyday and are subject to covert channels problems. Covert channels are used for the secret transfer of information. Encryption only protects communication from be...
متن کاملSecret Agent Radio: Covert Communication through Dirty Constellations
In this paper we propose a novel approach to implement high capacity, covert channel by encoding covert information in the physical layer of common wireless communication protocols. We call our technique Dirty Constellation because we hide the covert messages within a “dirty” constellation that mimics noise commonly imposed by hardware imperfections and channel conditions. The cover traffic in ...
متن کاملHiding out in plaintext : covert messaging with bitwise summations
vi CHAPTER 1. GENERAL INTRODUCTION 1 1.1 Problem Statement 1 1.2 Thesis Organization 1 1.3 Overview of Network Covert Channels 2 1.4 Overview of Information Hiding in TCP/IP 3 1.5 Network Layer 5 1.5.1 Do not Fragment Bit 5 1.5.2 IP Identification Field 6 1.5.3 IP Header Checksum 6 1.5.4 ICMP Data 6 1.6 Transport Layer 7 1.6.1 TCP Time Stamps 7 1.6.2 Sequence and Acknowledgment Fields 9 1.7 Act...
متن کاملCovert Channels in TCP/IP Protocol Stack
We give a survey of different techniques for hiding data in several protocols from the TCP/IP protocol stack. Techniques are organized according to affected layer and protocol. For every covert channel its data bandwidth is given.
متن کاملEvading Disk Investigation and Forensics using a Cluster-Based Covert Channel
Contemporary storage-based information hiding methods support plausible deniability by embedding encrypted information among bulk random content. Since the presence of random data is easily detected, these schemes facilitate plausible deniability by enabling disclosure of less sensitive information whilst concealing the existance of some other information. We propose a covert channel on storage...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 1999