Secure and reliable covert channel
暂无分享,去创建一个
We describe the design, implementation and evaluation of a reliable and secure protocol to establish a covert channel that not only maintains a high degree of stealthiness, but also provides reliability despite temporary data loss as well as data confidentiality. An important feature of our proposed protocol is that it can be embedded in any legitimate channel that is based on IP. In this paper, we describe our protocol using ICMP. In particular, the proposed protocol satisfies four important properties: stealthiness, lightweight, confidentiality and integrity, and reliability.
[1] Rachel Greenstadt,et al. Covert Messaging through TCP Timestamps , 2002, Privacy Enhancing Technologies.
[2] Craig H. Rowland,et al. Covert Channels in the TCP/IP Protocol Suite , 1997, First Monday.
[3] Deepa Kundur,et al. Practical Data Hiding in TCP/IP , 2002 .
[4] L. Kocarev,et al. Logistic map as a block encryption algorithm , 2001 .