Covert Channels are malicious conversation in a legitimate secured network communication that violates the security policies laid down. Covert channels are hidden, unintended design in the legitimate communication whose motto is to leak information. Trapdoors are unintended design with a communication system that exists in network covert channels as a part of rudimentary protocols. Subliminal channel, a variant of covert channel works similarly as network covert channel except that trapdoor is set in cryptographic algorithm. A composition of covert channel with subliminal channel is the Hybrid Channel or Hybrid Covert Channel. Hybrid Covert Channels are a major threat for security which is clearly unacceptable in presence of secured network communication. The objective of the present paper is to make microscopic analysis of behavior of hybrid covert channel with a clearly understanding of theoretical literatures of composed covert channels. Paper proposes practical implementation of transport layer based hybrid covert channeling based on TCP and SSL.
[1]
William Stallings,et al.
Cryptography and network security
,
1998
.
[2]
Carla E. Brodley,et al.
IP Covert Channel Detection
,
2009,
TSEC.
[3]
Andreas Willig,et al.
A Short Introduction to Queueing Theory
,
1999
.
[4]
Carla E. Brodley,et al.
IP covert timing channels: design and detection
,
2004,
CCS '04.
[5]
Butler W. Lampson,et al.
A note on the confinement problem
,
1973,
CACM.
[6]
Simmons,et al.
The Subliminal Channel and Digital Signatures
,
2022
.
[7]
J. Banks,et al.
Discrete-Event System Simulation
,
1995
.
[8]
VISHAL BHARTI,et al.
PRACTICAL DEVELOPMENT AND DEPLOYMENT OF COVERT COMMUNICATION IN IPV
,
2008
.
[9]
Marvin Schaefer,et al.
Program confinement in KVM/370
,
1977,
ACM '77.