Research on Construction Methods for Network Covert Channels Based on HTTP

2012 ◽  
Vol 220-223 ◽  
pp. 2528-2533
Author(s):  
Ran Zhang ◽  
Yong Gan ◽  
Yi Feng Yin

Network covert channel is a steganography technology that uses network traffic data as a carrier to transfer the secret data. This paper analyzes the working principle of network covert channels, and summarizes the commonly used construction technology of network covert channels. Then it analyzes the characteristics of the HTTP header lines and gives some methods of constructing network covert channels with these characteristics. Network covert channels based on the HTTP header lines are simple, flexible, and difficult to be detected and shielded.

2020 ◽  
Vol 2020 ◽  
pp. 1-20
Author(s):  
Jing Tian ◽  
Gang Xiong ◽  
Zhen Li ◽  
Gaopeng Gou

In order to protect user privacy or guarantee free access to the Internet, the network covert channel has become a hot research topic. It refers to an information channel in which the messages are covertly transmitted under the network environment. In recent years, many new construction schemes of network covert channels are proposed. But at the same time, network covert channel has also received the attention of censors, leading to many attacks. The network covert channel refers to an information channel in which the messages are covertly transmitted under the network environment. Many users exploit the network covert channel to protect privacy or guarantee free access to the Internet. Previous construction schemes of the network covert channel are based on information steganography, which can be divided into CTCs and CSCs. In recent years, there are some covert channels constructed by changing the transmission network architecture. On the other side, some research work promises that the characteristics of emerging network may better fit the construction of the network covert channel. In addition, the covert channel can also be constructed by changing the transmission network architecture. The proxy and anonymity communication technology implement this construction scheme. In this paper, we divide the key technologies for constructing network covert channels into two aspects: communication content level (based on information steganography) and transmission network level (based on proxy and anonymity communication technology). We give an comprehensively summary about covert channels at each level. We also introduce work for the three new types of network covert channels (covert channels based on streaming media, covert channels based on blockchain, and covert channels based on IPv6). In addition, we present the attacks against the network covert channel, including elimination, limitation, and detection. Finally, the challenge and future research trend in this field are discussed.


2018 ◽  
Vol 7 (2.4) ◽  
pp. 62
Author(s):  
G Yuvaraj ◽  
Siva Rama Lingham N ◽  
Rajkamal J

A mechanism that is intended to expose information against a security violation in a network is the use of network covert channel and it is difficult to detect information about data loss like location of loss using network covert channel. To identify the covert channel were the data pattern missing over the sharing of resources in networks. Several mechanisms are used to identify a large variation of covert channels. However, those mechanisms have more limitation like speed of detection, detection accuracy etc. In this paper, a new machine learning approaches called “Support Vector Machine and Hyperbolic Hopfield Neural Network” to overcome the drawbacks of existing methods. This approach is supported to classifying the different covert channels with data packets which is shared in networks and its supports to identifying the location of data loss or data pattern mismatched. Finally, the proposed methods properly detected covert channels with high accuracy and less detection high speed shared a network resources in effective manner.  


Author(s):  
A. Botta ◽  
A. Dainotti ◽  
A. Pescape ◽  
G. Ventre

Author(s):  
Kirti Chawla ◽  
Gabriel Robins

RFID technology can help competitive organizations optimize their supply chains. However, it may also enable adversaries to exploit covert channels to surreptitiously spy on their competitors. We explain how tracking tags and compromising readers can create covert channels in supply chains and cause detrimental economic effects. To mitigate such attacks, the authors propose a framework that enables an organization to monitor its supply chain. The supply chain is modeled as a network flow graph, where tag flow is verified at selected key nodes, and covert channels are actively sought. While optimal taint checkpoint node selection is algorithmically intractable, the authors propose node selection and flow verification heuristics with various tradeoffs. The chapter discusses economically viable countermeasures against supply chain-based covert channels, and suggests future research directions.


2018 ◽  
Vol 77 (9) ◽  
pp. 11459-11487 ◽  
Author(s):  
Zichan Ruan ◽  
Yuantian Miao ◽  
Lei Pan ◽  
Yang Xiang ◽  
Jun Zhang

PLoS ONE ◽  
2021 ◽  
Vol 16 (6) ◽  
pp. e0252813
Author(s):  
Songyin Fu ◽  
Rangding Wang ◽  
Li Dong ◽  
Diqun Yan

A multi-link network covert channel (MLCC) such as Cloak exhibits a high capacity and robustness and can achieve lossless modulation of the protocol data units. However, the mechanism of Cloak involving an arrangement of packets over the links (APL) is limited by its passive synchronization schemes, which results in intermittent obstructions in transmitting APL packets and anomalous link switching patterns. In this work, we propose a novel ordinal synchronization mark sequence (OSMS) for a Cloak framework based MLCC to ensure that the marked APL packets are orderly distinguishable. Specifically, a unidirectional function is used to generate the OSMS randomly before realizing covert modulation. Subsequently, we formulate the generation relation of the marks according to their order and embed each mark into the APL packets by using a one-way hash function such that the mark cannot be cracked during the transmission of the APL packet. Finally, we set up a retrieval function of the finite set at the covert receiver to extract the marks and determine their orders, and the APL packets are reorganized to realize covert demodulation. The results of experiments performed on real traffic indicated that the MLCC embedded with OSMS could avoid the passive synchronization schemes and exhibited superior performance in terms of reliability, throughput, and undetectability compared with the renowned Cloak method, especially under a malicious network interference scenario. Furthermore, our approach could effectively resist the inter-link correlation test, which are highly effective in testing the Cloak framework.


Sign in / Sign up

Export Citation Format

Share Document