A novel covert channel based on the IP header record route option

نویسندگان

  • Zouheir Trabelsi
  • Hesham El-Sayed
  • Lilia Frikha
  • Tamer F. Rabie
چکیده

In this paper we propose a novel covert channel for exchanging secret information, based on the IP header record route options. Instead of encrypting a secret message or embedding it into a multimedia object, as in traditional steganography, we process the entire message and generate several IP packets with different types to carry the secret information. Thereby we foil an eavesdropper who is primarily applying statistical tests to detect encrypted channels. We show that our approach provides more protection against steganalysis and sniffing attacks, and gives a covert channel capacity which is an order of magnitude higher than traditional methods.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Dynamics of the IP Time To Live Field in Internet Traffic Flows

The Time To Live (TTL) field present in the IP protocol header is used to limit the lifetime of packets in the network. Previous research has measured TTL for studying path lengths and dynamics in IP networks, and for detecting route changes. How the TTL varies over short timescales of subsequent packets of traffic flows has not yet been analysed. Such knowledge is needed for passively detectin...

متن کامل

Practical Data Hiding in TCP/IP

This work relates the areas of steganography, network protocols and security for practical data hiding in communication networks employing TCP/IP. Two approaches are proposed based on packet header manipulation and packet ordering within the IPSec framework. For the former the Internet protocol IPv4 header is analyzed to identify covert channels by exploiting redundancy and multiple interpretat...

متن کامل

Covert Channels in the IP Time To Live Field

Covert channels are used for the secret transfer of information. Unlike encryption, which only protects the information from unauthorised observers, covert channels aim to hide the very existence of the communication. The huge amount of data and vast number of different network protocols in the Internet makes it an ideal high-capacity vehicle for covert communication. Covert channels pose a ser...

متن کامل

An Evaluation Framework for the Analysis of Covert Channels in the TCP/IP Protocol Suite

Information hiding techniques can be used by criminals and terrorists to communicate over covert channels within the TCP/IP protocol suite and can be used to overcome firewalls and most other forms of network intrusion detection and prevention systems. In this work we describe the covert channel concept and weaknesses in the five layered TCP/IP layered model. We then present an evaluation frame...

متن کامل

Survey and Design Approach of Protocol Steganography in IPv6

Steganography is the process of hiding message in another cover medium such that it is difficult to detect. Cover medium is used as a carrier. this carrier can be Image,video, text or IP packet. Covert Channel is implemented in different header Fields of IPv4 header to send secrete message. A covert channel is the medium that is used to transmit the information such as message, image or file. T...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IJAMC

دوره 1  شماره 

صفحات  -

تاریخ انتشار 2007