2011 IEEE/IFIP 41st International Conference on Dependable Systems &Amp; Networks (DSN) 2011
DOI: 10.1109/dsn.2011.5958260
|View full text |Cite
|
Sign up to set email alerts
|

A combinatorial approach to network covert communications with applications in Web Leaks

Abstract: Various effective network covert channels have recently demonstrated the feasibility of encoding messages into the timing or content of individual network objects, such as data packets and request messages. However, we show in this paper that more robust and stealthy network covert channels can be devised by exploiting the relationship of the network objects. In particular, we propose a combinatorial approach for devising a wide spectrum of covert channels which can meet different objectives based on the chann… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
23
0

Year Published

2012
2012
2023
2023

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 16 publications
(23 citation statements)
references
References 30 publications
0
23
0
Order By: Relevance
“…Especially, Luo et al [20][21][22] designed a combinatorics-based scheme, called Cloak, to transmit information in the ordering of packets within different flows. Based on the 12-fold way in [26], Cloak offers ten different encoding and decoding methods, each of which has a unique tradeoff between undetectability and capacity.…”
Section: Http Headermentioning
confidence: 99%
“…Especially, Luo et al [20][21][22] designed a combinatorics-based scheme, called Cloak, to transmit information in the ordering of packets within different flows. Based on the 12-fold way in [26], Cloak offers ten different encoding and decoding methods, each of which has a unique tradeoff between undetectability and capacity.…”
Section: Http Headermentioning
confidence: 99%
“…In the second type, some combinatorial function is applied to the IPDs to inject the covert message. This type of CTCs is also referred to as combinatorial CTCs, which can be based on a single flow as in or multiple flows as in . In the case of a single flow, packets are transmitted in groups where the size of the group is used to encode information .…”
Section: Motivation and Related Workmentioning
confidence: 99%
“…A predetermined IPD is used to demarcate groups. In the case of multiple flows, both the size of the group and the flow in which the group of packets arrives are used to encode information . In this paper, we consider the design, implementation, and performance evaluation of a model‐based CTC.…”
Section: Motivation and Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Luo et al [72] implemented ACKLeaks covert channel which embeds covert messages into pure TCP ACK packets from single or multiple TCP connections, using the combinatorial approach. ACKLeaks can evade contentbased detection methods and can be implemented by exploiting the existing TCP connections.…”
Section: Steganography In Transport Layermentioning
confidence: 99%