Skip to main content

Research on Covert Channels Based on Multiple Networks

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 8710))

Abstract

Covert channel is a kind of method, used to transmit message secretly usually. Till now, most covert channel uses one network with protocol header or filter bits, time interval of packets etc. With the development of networks, using multiple networks transmit data getting more common. In this paper, a new kind of covert channel is proposed using multi-networks to transmit ciphertext. One is used to transmit key, and the others are used to transmit ciphertext. In the experiment, the key is transmitted with 3G network, while the cipher using WiFi network in the covert channel. For making the covert channel more robust, we use one time padding to encrypt our message. We also measure the accuracy with different transmission speed. The result shows that the covert channel we propose has high accuracy with different transmission speed.

The Fundamental Research Funds for the Central Universities Contract No. 2012JBM030.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Jadhav, M.V.: &Kattimani, S. L.: Effective detection mechanism for TCP based hybrid covert channels in secure communication. In: International Conference Emerging Trends in Electrical and Computer Technology (ICETECT), pp. 1123–1128. IEEE Press, India (2011)

    Google Scholar 

  2. Liu, X., Xue, H., Dai, Y.: A Self Adaptive Jamming Strategy to Restrict Covert Timing Channel. In: 2nd International Symposium Intelligence Information Processing and Trusted Computing (IPTC), pp. 1–4. IEEE Press, Bangkok (2011)

    Google Scholar 

  3. Sun, Y., Zhang, X.: A kind of covert channel analysis method based on trusted pipeline. In: 2011 International Conference on Electrical and Control Engineering (ICECE), pp. 5660–5663. IEEE Press, Yi Chang (2011)

    Chapter  Google Scholar 

  4. Rezaei, F., Hempel, M., Peng, D., Sharif, H.: Disrupting and Preventing Late-Packet Covert Communication Using Sequence Number Tracking. In: Military Communications Conference, MILCOM 2013, pp. 599–604. IEEE Press, San Diego (2013)

    Chapter  Google Scholar 

  5. Ahmadzadeh, S.A., Agnew, G.: Turbo covert channel: An iterative framework for covert communication over data networks. In: Proceedings of the IEEE INFOCOM, pp. 2031–2039. IEEE Press, Turin (2013)

    Google Scholar 

  6. Lin, Y., Ding, L., Wu, J., Xie, Y., Wang, Y.: Robust and Efficient Covert Channel Communications in Operating Systems: Design, Implementation and Evaluation. In: 7th International Conference on Software Security and Reliability-Companion (SERE-C), pp. 45–52. IEEE Press, Gaithersburg (2013)

    Google Scholar 

  7. Lalande, J.F.: Hiding Privacy Leaks in Android Applications Using Low-Attention Raising Covert Channels. In: 2013 Eighth International Conference on Availability, Reliability and Security (ARES), pp. 701–710. IEEE Press, Regensburg (2013)

    Chapter  Google Scholar 

  8. Okhravi, H., Bak, S., King, S.T.: Design, implementation and evaluation of covert channel attacks. In: Technologies for Homeland Security (HST), pp. 481–487. IEEE Press (2010)

    Google Scholar 

  9. Wu, Z., Xu, Z., Wang, H.: Whispers in the hyper-space: High-speed covert channel attacks in the cloud. In: The 21st USENIX Security Symposium (Security 2012) (2012)

    Google Scholar 

  10. Hashim, F., Munasinghe, K.S., Jamalipour, A.: Biologically inspired anomaly detection and security control frameworks for complex heterogeneous networks. IEEE Transactions on Network and Service Management 7(4), 268–281 (2010)

    Article  Google Scholar 

  11. Zhang, L., Miyajima, H., Hayashi, H.: An effective SIP security solution for heterogeneous mobile networks. In: IEEE International Conference on Communications, ICC 2009, pp. 1–5. IEEE Press, Dresden (2009)

    Google Scholar 

  12. Gondi, V.K., Agoulmine, N.: Low Latency Handover and Roaming Using Security Context Transfer for Heterogeneous Wireless and Cellular Networks. In: 2010 IEEE Asia-Pacific Services Computing Conference (APSCC), pp. 548–554. IEEE Press, Hang Zhou (2010)

    Chapter  Google Scholar 

  13. Hsiao, W.H., Su, H.K., Chen, K.J., Zheng, R.H., Chen, J.S.: Mobility-aware security management for heterogeneous wireless networks. In: 2010 International Computer Symposium (ICS), pp. 818–823. IEEE Press, Tai Bei (2010)

    Chapter  Google Scholar 

  14. Liang, Q., Bin, L., Mingzeng, H.: Research of Network Covert Channel Based on HTTP Protocol. Computer Engineering 31(15), 224–225 (2005)

    Google Scholar 

  15. Qixiang, W., Zumeng, L., Hua, M.: Research on Covert Channel Based on HTTP Protocol. Information Security and Communications Privacy 1, 73–74 (2009)

    Google Scholar 

  16. Shengyang, C., Yuan, Z., Muntean, G.-M.: An energy-aware multipath-TCP-based content delivery scheme in heterogeneous wireless networks. In: Wireless Communications and Networking Conference (WCNC), pp. 1291–1296. IEEE, Shang Hai (2013)

    Google Scholar 

  17. Yunchuan, G., Lihua, Y., Yuan, Z., Binxing, F.: Quantifying Information Leakage for Fully Probabilistic Systems. In: 2010 IEEE 10th International Conference on Computer and Information Technology (CIT), pp. 589–595. IEEE, Bradford (2010)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

Zhang, D., Du, P., Yang, Z., Dong, L. (2014). Research on Covert Channels Based on Multiple Networks. In: Han, W., Huang, Z., Hu, C., Zhang, H., Guo, L. (eds) Web Technologies and Applications. APWeb 2014. Lecture Notes in Computer Science, vol 8710. Springer, Cham. https://doi.org/10.1007/978-3-319-11119-3_34

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-11119-3_34

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-11118-6

  • Online ISBN: 978-3-319-11119-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics