2007
DOI: 10.1007/978-0-387-72367-9_29
|View full text |Cite
|
Sign up to set email alerts
|

Crafting Web Counters into Covert Channels

Abstract: Abstract. We present in this paper a new network storage channel WebShare that uses the plentiful, public Web counters for storage. Therefore, the physical locations of the WebShare encoder and decoder are not restricted to a single path. To make WebShare practical, we have addressed a number of thorny issues, such as the "noise" introduced by other legitimate Web requests, and synchronization between encoder and decoder. For the proof-of-concept purpose, we have experimented a WebShare prototype in the Intern… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2011
2011
2021
2021

Publication Types

Select...
4
1

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(5 citation statements)
references
References 14 publications
0
5
0
Order By: Relevance
“…Finally there are examples of exfiltration techniques that do not apply to isolated networks. For example, [36] uses a web counter as a covert channel, but this requires the DMZ target host to have (1) a shared web application between the internal and the external networks; and (2) to have a web counter in that application. [12] uses public cloud service as a covert channel, and [51] uses multiple public services as a covert channel.…”
Section: Other Side Channels and Exfiltration Techniquesmentioning
confidence: 99%
“…Finally there are examples of exfiltration techniques that do not apply to isolated networks. For example, [36] uses a web counter as a covert channel, but this requires the DMZ target host to have (1) a shared web application between the internal and the external networks; and (2) to have a web counter in that application. [12] uses public cloud service as a covert channel, and [51] uses multiple public services as a covert channel.…”
Section: Other Side Channels and Exfiltration Techniquesmentioning
confidence: 99%
“…Most storage channels use specification-based approaches to locate possible covers [38], [39]. Existing literature and tools on storage channels have already covered many popular protocols (e.g., IP [10], [39], TCP [10], [36], [40], SSH [41], and HTTP [6]) and applications (e.g., Web counter [29], VoIP [42]). …”
Section: Camouflage Capabilitymentioning
confidence: 99%
“…To eliminate such anomalies, we propose a web group hopping (WGH) method, which is motivated by WebShare's site-hopping algorithm [29]. Using this approach, the encoder and the decoder agree on a set of web pages that can be divided into N W groups, each of which includes R web pages.…”
mentioning
confidence: 99%
“…This limitation on the detector obviates the need to steganographically embed SIN communication in packets (with one exception, discussed in §IV-A). Nevertheless, SIN draws inspiration from other works focused on embedding one type of service steganographically within another, e.g., a file system within a file system [11], a file system or wiki within a media hosting and sharing service [12], [13], or communication within web counters [14].…”
Section: Related Workmentioning
confidence: 99%