2012
DOI: 10.1007/978-3-642-32805-3_11
|View full text |Cite
|
Sign up to set email alerts
|

Systematic Engineering of Control Protocols for Covert Channels

Abstract: Within the last years, new techniques for network covert channels arose, such as covert channel overlay networking, protocol switching covert channels, and adaptive covert channels. These techniques have in common that they rely on covert channel-internal control protocols (so called micro protocols) placed within the hidden bits of a covert channel's payload. An adaptable approach for the engineering of such micro protocols is not available. This paper introduces a protocol engineering technique for micro pro… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
0

Year Published

2013
2013
2019
2019

Publication Types

Select...
5
2
1

Relationship

5
3

Authors

Journals

citations
Cited by 11 publications
(13 citation statements)
references
References 17 publications
0
13
0
Order By: Relevance
“…covert channel-internal control protocols with reliability features [Ray and Mishra 2008]. Micro protocols have been well studied over the last years and optimized micro protocols are available [Wendzel and Keller 2012b;Backs et al 2012].…”
Section: Similar Approaches To Pattern Variationmentioning
confidence: 99%
“…covert channel-internal control protocols with reliability features [Ray and Mishra 2008]. Micro protocols have been well studied over the last years and optimized micro protocols are available [Wendzel and Keller 2012b;Backs et al 2012].…”
Section: Similar Approaches To Pattern Variationmentioning
confidence: 99%
“…This is similar to existing network covert channel techniques which comprise an internal control header (the control channel) and a payload area (the data channel) like presented in [32], [33]. Table II summarizes the control and data channels of the covert channels discussed in this Section.…”
Section: B Covert Channel Setupmentioning
confidence: 84%
“…While the concept evolved in military contexts, today, the threats of covert communication have reached the mainstream and various implementations based on many different communication methods, such as IP, exist as research prototypes [9,20,25] and "in the wild" [1,5]. While the specific encoding and methods for creating covert channels were refined, the actual implementation almost always focuses on protocol layers at or above the data link layer [13,17,21,31]. Consequently defensive methods, i.e., attempts to detect a covert channel, usually assume a packet abstraction such as the one provided by the Internet Protocol [4,8,18,33].…”
Section: Related Workmentioning
confidence: 99%