Abstract
Covert Channels are malicious conversation in a legitimate secured network communication that violates the security policies laid down. Covert channels are hidden, unintended design in the legitimate communication whose motto is to leak information. Trapdoors are unintended design with a communication system that exists in network covert channels as a part of rudimentary protocols. Subliminal channel, a variant of covert channel works similarly as network covert channel except that trapdoor is set in cryptographic algorithm. A composition of covert channel with subliminal channel is the Hybrid Channel or Hybrid Covert Channel. Hybrid Covert Channels are a major threat for security which is clearly unacceptable in presence of secured network communication. The objective of the present paper is to make microscopic analysis of behavior of hybrid covert channel with a clearly understanding of theoretical literatures of composed covert channels. Paper proposes practical implementation of transport layer based hybrid covert channeling based on TCP and SSL.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Bharti, V.: Practical Development and Deployment of Covert Communication in IPv4. Journal on Theoretical and Applied Information Technology (April 2007)
Simmons, G.J.: The Prisoner’s Problem and the Subliminal Channel. Springer, Heidelberg (1996)
Simmons, G.J.: The Subliminal Channel and Digital Signatures. Springer, Heidelberg (1998)
Cabuk, S., Brodley, C., Sheilds, C.: IP Covert Channel Detection. ACM Transaction on Information and System Security, Article 22, 12 (April 2009)
Cabuk, S., Brodley, C., Sheilds, C.: IP Covert Timing Channels: Design and Detection. In: CCS 2004 (October 2004)
Golebiewski, Z.: Stealing Secrets with SSL/TLS and SSH -Kleptographic Attack. Lecture Notes at Institute of Mathematics and Computer Science, pp. 3–11. Wroclaw University of Technology
Lampson, B.W.: A Note on the Confinement Problem. Communication of the ACM (1973)
Willig, A.: A Short Introduction to Queuing Theory. Lecture Notes at Technical University, Berlin (July 1999)
Young, A.: Malicious Cryptography, 1st edn., pp. 220–240. Wiley Publishing, Chichester (February 2004)
Stallings, W.: Cryptography and Network Security, 3rd edn. Pearson Publishing, London (2006)
Banks, J., et al.: Discrete Event System Simulation, 3rd edn. Prentice Hall, Englewood Cliffs (January 2001)
Tannebaum, A.: Computer Networks, 4th edn. Pearson Education, London (2008)
Gold, S.M., et al.: Program Confinement in KVM/370. In: Proceeding of The ACM Annual Conference, pp. 404–441 (1977)
Murdoch, S.: Embedding Covert Channel in to TCP/IP. In: Information Hiding Workshop (July 2005)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Anjan, K., Abraham, J. (2010). Behavioral Analysis of Transport Layer Based Hybrid Covert Channel. In: Meghanathan, N., Boumerdassi, S., Chaki, N., Nagamalai, D. (eds) Recent Trends in Network Security and Applications. CNSA 2010. Communications in Computer and Information Science, vol 89. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-14478-3_9
Download citation
DOI: https://doi.org/10.1007/978-3-642-14478-3_9
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-14477-6
Online ISBN: 978-3-642-14478-3
eBook Packages: Computer ScienceComputer Science (R0)