Skip to main content

Behavioral Analysis of Transport Layer Based Hybrid Covert Channel

  • Conference paper
Recent Trends in Network Security and Applications (CNSA 2010)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 89))

Included in the following conference series:

Abstract

Covert Channels are malicious conversation in a legitimate secured network communication that violates the security policies laid down. Covert channels are hidden, unintended design in the legitimate communication whose motto is to leak information. Trapdoors are unintended design with a communication system that exists in network covert channels as a part of rudimentary protocols. Subliminal channel, a variant of covert channel works similarly as network covert channel except that trapdoor is set in cryptographic algorithm. A composition of covert channel with subliminal channel is the Hybrid Channel or Hybrid Covert Channel. Hybrid Covert Channels are a major threat for security which is clearly unacceptable in presence of secured network communication. The objective of the present paper is to make microscopic analysis of behavior of hybrid covert channel with a clearly understanding of theoretical literatures of composed covert channels. Paper proposes practical implementation of transport layer based hybrid covert channeling based on TCP and SSL.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Bharti, V.: Practical Development and Deployment of Covert Communication in IPv4. Journal on Theoretical and Applied Information Technology (April 2007)

    Google Scholar 

  2. Simmons, G.J.: The Prisoner’s Problem and the Subliminal Channel. Springer, Heidelberg (1996)

    Google Scholar 

  3. Simmons, G.J.: The Subliminal Channel and Digital Signatures. Springer, Heidelberg (1998)

    Google Scholar 

  4. Cabuk, S., Brodley, C., Sheilds, C.: IP Covert Channel Detection. ACM Transaction on Information and System Security, Article 22, 12 (April 2009)

    Google Scholar 

  5. Cabuk, S., Brodley, C., Sheilds, C.: IP Covert Timing Channels: Design and Detection. In: CCS 2004 (October 2004)

    Google Scholar 

  6. Golebiewski, Z.: Stealing Secrets with SSL/TLS and SSH -Kleptographic Attack. Lecture Notes at Institute of Mathematics and Computer Science, pp. 3–11. Wroclaw University of Technology

    Google Scholar 

  7. Lampson, B.W.: A Note on the Confinement Problem. Communication of the ACM (1973)

    Google Scholar 

  8. Willig, A.: A Short Introduction to Queuing Theory. Lecture Notes at Technical University, Berlin (July 1999)

    Google Scholar 

  9. Young, A.: Malicious Cryptography, 1st edn., pp. 220–240. Wiley Publishing, Chichester (February 2004)

    Google Scholar 

  10. Stallings, W.: Cryptography and Network Security, 3rd edn. Pearson Publishing, London (2006)

    Google Scholar 

  11. Banks, J., et al.: Discrete Event System Simulation, 3rd edn. Prentice Hall, Englewood Cliffs (January 2001)

    Google Scholar 

  12. Tannebaum, A.: Computer Networks, 4th edn. Pearson Education, London (2008)

    Google Scholar 

  13. Gold, S.M., et al.: Program Confinement in KVM/370. In: Proceeding of The ACM Annual Conference, pp. 404–441 (1977)

    Google Scholar 

  14. Murdoch, S.: Embedding Covert Channel in to TCP/IP. In: Information Hiding Workshop (July 2005)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Anjan, K., Abraham, J. (2010). Behavioral Analysis of Transport Layer Based Hybrid Covert Channel. In: Meghanathan, N., Boumerdassi, S., Chaki, N., Nagamalai, D. (eds) Recent Trends in Network Security and Applications. CNSA 2010. Communications in Computer and Information Science, vol 89. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-14478-3_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-14478-3_9

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-14477-6

  • Online ISBN: 978-3-642-14478-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics