Covert channels are malicious conversation in a legitimate secured network communication that violates the security policies laid down. Covert channels are hidden, intended design in the legitimate communication whose motto is to leak information. Trapdoors are unintended design with a communication system that exists in network covert channels as a part of rudimentary protocols. Subliminal channel, a variant of covert channel works similarly as network covert channel except that trapdoor is set in cryptographic algorithm. Feel of covertness can better be understood by classical problem-“The Prisoner's Problem” illustrated by G. Simmons and further exploration of attacks based on it can be understood by Dr. Adam Young's book on Malicious Cryptography. In this paper, Hybrid Covert Channel is visualized as composition of covert channel in TCP and subliminal channel in SSL. Hybrid Covert Channel is the co-existence of homogeneous or heterogeneous network covert channel variants either at same instant or at regular instant of time. Hybrid covert channels are a major threat for security which is clearly unacceptable in presence of secure network communication. The paper deals with detection of intra LAN covert activities and developing a detection engine that can detect or analyze the hybrid covert channel on Transport layer with a clear understanding of theoretical literatures of composed covert channels.
[1]
Carla E. Brodley,et al.
IP Covert Channel Detection
,
2009,
TSEC.
[2]
Simmons,et al.
The Subliminal Channel and Digital Signatures
,
2022
.
[3]
J. Banks,et al.
Discrete-Event System Simulation
,
1995
.
[4]
VISHAL BHARTI,et al.
PRACTICAL DEVELOPMENT AND DEPLOYMENT OF COVERT COMMUNICATION IN IPV
,
2008
.
[5]
William Stallings,et al.
Cryptography and network security
,
1998
.
[6]
Gustavus J. Simmons,et al.
The Prisoners' Problem and the Subliminal Channel
,
1983,
CRYPTO.
[7]
Anjan K. Koundinya,et al.
Behavioral Analysis of Transport Layer Based Hybrid Covert Channel
,
2010,
CNSA.
[8]
Scott Craver,et al.
A supraliminal channel in a wireless phone application
,
2009,
MM&Sec '09.
[9]
Gustavus J. Simmons,et al.
The Subliminal Channel and Digital Signature
,
1985,
EUROCRYPT.