Open Access   Article Go Back

Review on covert channel detection methods of TCP/IP header

Apurva N. Mahajan1 , I. R. Shaikh2

Section:Review Paper, Product Type: Journal Paper
Volume-2 , Issue-12 , Page no. 53-56, Dec-2014

Online published on Dec 31, 2014

Copyright © Apurva N. Mahajan , I. R. Shaikh . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Apurva N. Mahajan , I. R. Shaikh, “Review on covert channel detection methods of TCP/IP header,” International Journal of Computer Sciences and Engineering, Vol.2, Issue.12, pp.53-56, 2014.

MLA Style Citation: Apurva N. Mahajan , I. R. Shaikh "Review on covert channel detection methods of TCP/IP header." International Journal of Computer Sciences and Engineering 2.12 (2014): 53-56.

APA Style Citation: Apurva N. Mahajan , I. R. Shaikh, (2014). Review on covert channel detection methods of TCP/IP header. International Journal of Computer Sciences and Engineering, 2(12), 53-56.

BibTex Style Citation:
@article{Mahajan_2014,
author = {Apurva N. Mahajan , I. R. Shaikh},
title = {Review on covert channel detection methods of TCP/IP header},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {12 2014},
volume = {2},
Issue = {12},
month = {12},
year = {2014},
issn = {2347-2693},
pages = {53-56},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=332},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=332
TI - Review on covert channel detection methods of TCP/IP header
T2 - International Journal of Computer Sciences and Engineering
AU - Apurva N. Mahajan , I. R. Shaikh
PY - 2014
DA - 2014/12/31
PB - IJCSE, Indore, INDIA
SP - 53-56
IS - 12
VL - 2
SN - 2347-2693
ER -

VIEWS PDF XML
3588 3428 downloads 3527 downloads
  
  
           

Abstract

A covert channel is any methodology of communication that’s acquainted illicitly transfer data, so breaking the security policy of a system. A network covert channel is a covert statement by hiding covert messages in to explicit network packets. Any shared resource will be probably used as a covert channel. In recent years with the growth of various hiding methods, network covert channel has become a new kind of intimidation for network security. A covert channel is an unplanned design within authentic communication whose axiom is to leak information as a part of undeveloped protocols. In fact, most detection systems can detect hidden data in the payload, but struggle to survive with data hidden in the IP and TCP packet headers. The huge number of protocols in internet seems ideal as a high-bandwidth vehicle for covert communication. Due to unwanted and malevolent nature of covert channel applications and as it poses a serious security threat to network, it is recommended to detect covert channels efficiently. This paper presents a criticism of TCP/IP covert channel design and their detection scheme and presents a proposed method based on Naive-Bayesian classifier to detect covert channels in TCP ISN and IP ID fields of TCP/IP packet.

Key-Words / Index Term

TCP/IP covert channel, TCP, IP, network security

References

[1] R. J. Anderson and F. A. P. Petitcolas, “On the limits of steganography,” IEEE J. Sel. Areas Commun., vol. 16, no. 4, pp. 474–481, May1998.
[2] S. Attallah, “Trusted Computer System Evaluation Criteria”, Tech. Rep. DOD 5200. 28-STD, 1985 [Online]. Available: http:// csrc.nist.gov/ publistications/history/dod85.pdf.
[3] V. Forte, C.Maruti, M. R. Vetturi, and M. Zambelli, “SecSyslog: An approach to secure logging based on covert channels,” in Proc. First Int. Wksp. Systematic Approaches to Digital Forensic Engineering, pp. 248–263, Nov. 2005.
[4] Transmission Control Protocol (TCP), Information Sciences Institute, University of Southern California, RFC 793, Sep. 1981.
[5] Internet Protocol (IP), Information Sciences Institute, University of Southern California, RFC 791, Sep. 1981.
[6] M. Owens, “A Discussion of Covert Channels and Steganography”, SANS (SysAdmin, Audit, Network, Security) Institute, 2002.
[7] K.Szczypiorski, “Steganography in TCP/IP Networks. State of the Art and a Proposal of a New System HICCUPS Institute of Telecommunications Seminar [Online], Retrieved Jun. 2010
[8] T. Sohn, J. S. , and J. Moon, “A study on covert channel detection of TCP/IP header using support vector machine,” in Proc. 5th Int. Conf. Information and Communication Security (ICICS 2003), pp. 313–324, Oct. 2003.