Proceedings of the 4th International Conference on Security of Information and Networks 2011
DOI: 10.1145/2070425.2070447
|View full text |Cite
|
Sign up to set email alerts
|

A HTTP cookie covert channel

Abstract: This paper presents a new covert channel based on Google Analytic web cookies in HTTP protocol. The new covert channel is difficult to disrupt and is capable of reasonably high bandwidths. The Google Analytic framework is used by over half of the most popular web sites currently on the Internet; its ubiquitousness across the web implies a great impact of this covert channel.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2013
2013
2018
2018

Publication Types

Select...
3
1

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 9 publications
0
2
0
Order By: Relevance
“…There have been many research papers exploring the varied mechanisms and implementations of covert channels [3]. HTTPS and HTTP protocols have been the vehicle for several covert channel applications [4][5] [6]. Numerous other studies have been done using other aspects of the TCP/IP protocol [7][8] [9][10] [11][12] [13].…”
Section: Introductionmentioning
confidence: 99%
“…There have been many research papers exploring the varied mechanisms and implementations of covert channels [3]. HTTPS and HTTP protocols have been the vehicle for several covert channel applications [4][5] [6]. Numerous other studies have been done using other aspects of the TCP/IP protocol [7][8] [9][10] [11][12] [13].…”
Section: Introductionmentioning
confidence: 99%
“…A typical covert channel in HTTP just disguises some prohibited protocols by encapsulating covert traffic inside the payload of HTTP, but the channel is frustrated by a statistical detection technique paying attention to HTTP behavior characteristics . Another covert channel in HTTP just attaches messages into the URLs or the cookies . However, the inexistent URLs and the illegal tampering in cookies can be easily recognized by advanced application‐layer gateways .…”
Section: Introductionmentioning
confidence: 99%