2016
DOI: 10.1002/sec.1503
|View full text |Cite
|
Sign up to set email alerts
|

Design and analysis of the covert channel implemented by behaviors of network users

Abstract: In this paper, a novel covert channel, called covert behavior channel, is proposed according to behaviors of network users to solve the security and efficiency problem of the traditional covert channel. In the proposed channel, operation sequences of the network protocols are used as carriers of covert information. An encryption‐based information embedding scheme is designed to improve security of the covert information. With the help of Markov model, the capacity of the proposed covert channel with time‐varyi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
1
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
4
3

Relationship

1
6

Authors

Journals

citations
Cited by 9 publications
(2 citation statements)
references
References 26 publications
(32 reference statements)
0
1
0
Order By: Relevance
“…Furthermore, the CSC is vulnerable to active network intermediaries (ANIs) (e.g., protocol scrubbers [ 12 ] and traffic normalizers [ 13 ]). Although the concealment capacities of the CTC are more enhanced than those of the CSC [ 14 , 15 ], the approach is susceptible to synchronization problems, noise and malicious attacks [ 16 ] since the CTC is built on a single unidirectional link, which makes it difficult to employ link quality feedback and reception confirmation schemes [ 17 ]. Moreover, the CTC flow uses the same link as that of the overt flow in a time-sharing manner, therefore, in principle, an active monitor can always identify the differences between the two flows to detect the existence of the CTC.…”
Section: Methodsmentioning
confidence: 99%
“…Furthermore, the CSC is vulnerable to active network intermediaries (ANIs) (e.g., protocol scrubbers [ 12 ] and traffic normalizers [ 13 ]). Although the concealment capacities of the CTC are more enhanced than those of the CSC [ 14 , 15 ], the approach is susceptible to synchronization problems, noise and malicious attacks [ 16 ] since the CTC is built on a single unidirectional link, which makes it difficult to employ link quality feedback and reception confirmation schemes [ 17 ]. Moreover, the CTC flow uses the same link as that of the overt flow in a time-sharing manner, therefore, in principle, an active monitor can always identify the differences between the two flows to detect the existence of the CTC.…”
Section: Methodsmentioning
confidence: 99%
“…In this case, covert communication has attracted much attention as a key technology for network security. Traditionally, covert communication systems (CCS) are designed by using network protocols, such as transmission control protocols (TCP), Internet protocol (IP), and media access control (MAC) protocols [5]. However, these communication systems cannot be used for wireless sensors in IoT systems.…”
Section: Introductionmentioning
confidence: 99%