Abstract
Covert channel is a kind of method, used to transmit message secretly usually. Till now, most covert channel uses one network with protocol header or filter bits, time interval of packets etc. With the development of networks, using multiple networks transmit data getting more common. In this paper, a new kind of covert channel is proposed using multi-networks to transmit ciphertext. One is used to transmit key, and the others are used to transmit ciphertext. In the experiment, the key is transmitted with 3G network, while the cipher using WiFi network in the covert channel. For making the covert channel more robust, we use one time padding to encrypt our message. We also measure the accuracy with different transmission speed. The result shows that the covert channel we propose has high accuracy with different transmission speed.
The Fundamental Research Funds for the Central Universities Contract No. 2012JBM030.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Jadhav, M.V.: &Kattimani, S. L.: Effective detection mechanism for TCP based hybrid covert channels in secure communication. In: International Conference Emerging Trends in Electrical and Computer Technology (ICETECT), pp. 1123–1128. IEEE Press, India (2011)
Liu, X., Xue, H., Dai, Y.: A Self Adaptive Jamming Strategy to Restrict Covert Timing Channel. In: 2nd International Symposium Intelligence Information Processing and Trusted Computing (IPTC), pp. 1–4. IEEE Press, Bangkok (2011)
Sun, Y., Zhang, X.: A kind of covert channel analysis method based on trusted pipeline. In: 2011 International Conference on Electrical and Control Engineering (ICECE), pp. 5660–5663. IEEE Press, Yi Chang (2011)
Rezaei, F., Hempel, M., Peng, D., Sharif, H.: Disrupting and Preventing Late-Packet Covert Communication Using Sequence Number Tracking. In: Military Communications Conference, MILCOM 2013, pp. 599–604. IEEE Press, San Diego (2013)
Ahmadzadeh, S.A., Agnew, G.: Turbo covert channel: An iterative framework for covert communication over data networks. In: Proceedings of the IEEE INFOCOM, pp. 2031–2039. IEEE Press, Turin (2013)
Lin, Y., Ding, L., Wu, J., Xie, Y., Wang, Y.: Robust and Efficient Covert Channel Communications in Operating Systems: Design, Implementation and Evaluation. In: 7th International Conference on Software Security and Reliability-Companion (SERE-C), pp. 45–52. IEEE Press, Gaithersburg (2013)
Lalande, J.F.: Hiding Privacy Leaks in Android Applications Using Low-Attention Raising Covert Channels. In: 2013 Eighth International Conference on Availability, Reliability and Security (ARES), pp. 701–710. IEEE Press, Regensburg (2013)
Okhravi, H., Bak, S., King, S.T.: Design, implementation and evaluation of covert channel attacks. In: Technologies for Homeland Security (HST), pp. 481–487. IEEE Press (2010)
Wu, Z., Xu, Z., Wang, H.: Whispers in the hyper-space: High-speed covert channel attacks in the cloud. In: The 21st USENIX Security Symposium (Security 2012) (2012)
Hashim, F., Munasinghe, K.S., Jamalipour, A.: Biologically inspired anomaly detection and security control frameworks for complex heterogeneous networks. IEEE Transactions on Network and Service Management 7(4), 268–281 (2010)
Zhang, L., Miyajima, H., Hayashi, H.: An effective SIP security solution for heterogeneous mobile networks. In: IEEE International Conference on Communications, ICC 2009, pp. 1–5. IEEE Press, Dresden (2009)
Gondi, V.K., Agoulmine, N.: Low Latency Handover and Roaming Using Security Context Transfer for Heterogeneous Wireless and Cellular Networks. In: 2010 IEEE Asia-Pacific Services Computing Conference (APSCC), pp. 548–554. IEEE Press, Hang Zhou (2010)
Hsiao, W.H., Su, H.K., Chen, K.J., Zheng, R.H., Chen, J.S.: Mobility-aware security management for heterogeneous wireless networks. In: 2010 International Computer Symposium (ICS), pp. 818–823. IEEE Press, Tai Bei (2010)
Liang, Q., Bin, L., Mingzeng, H.: Research of Network Covert Channel Based on HTTP Protocol. Computer Engineering 31(15), 224–225 (2005)
Qixiang, W., Zumeng, L., Hua, M.: Research on Covert Channel Based on HTTP Protocol. Information Security and Communications Privacy 1, 73–74 (2009)
Shengyang, C., Yuan, Z., Muntean, G.-M.: An energy-aware multipath-TCP-based content delivery scheme in heterogeneous wireless networks. In: Wireless Communications and Networking Conference (WCNC), pp. 1291–1296. IEEE, Shang Hai (2013)
Yunchuan, G., Lihua, Y., Yuan, Z., Binxing, F.: Quantifying Information Leakage for Fully Probabilistic Systems. In: 2010 IEEE 10th International Conference on Computer and Information Technology (CIT), pp. 589–595. IEEE, Bradford (2010)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this paper
Cite this paper
Zhang, D., Du, P., Yang, Z., Dong, L. (2014). Research on Covert Channels Based on Multiple Networks. In: Han, W., Huang, Z., Hu, C., Zhang, H., Guo, L. (eds) Web Technologies and Applications. APWeb 2014. Lecture Notes in Computer Science, vol 8710. Springer, Cham. https://doi.org/10.1007/978-3-319-11119-3_34
Download citation
DOI: https://doi.org/10.1007/978-3-319-11119-3_34
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-11118-6
Online ISBN: 978-3-319-11119-3
eBook Packages: Computer ScienceComputer Science (R0)