Systematic Engineering of Control Protocols for Covert Channels - Communications and Multimedia Security Access content directly
Conference Papers Year : 2012

Systematic Engineering of Control Protocols for Covert Channels

Steffen Wendzel
  • Function : Author
  • PersonId : 1010436
Jörg Keller
  • Function : Author
  • PersonId : 872397

Abstract

Within the last years, new techniques for network covert channels arose, such as covert channel overlay networking, protocol switching covert channels, and adaptive covert channels. These techniques have in common that they rely on covert channel-internal control protocols (so called micro protocols) placed within the hidden bits of a covert channel’s payload. An adaptable approach for the engineering of such micro protocols is not available. This paper introduces a protocol engineering technique for micro protocols. We present a two-layer system comprising six steps to create a micro protocol design. The approach tries to combine different goals: (1) simplicity, (2) ensuring a standard-conform behaviour of the underlying protocol if the micro protocol is used within a binary protocol header, as well as we provide an optimization technique to (3) raise as little attention as possible. We apply a context-free and regular grammar to analyze the micro protocol’s behavior within the context of the underlying network protocol.
Fichier principal
Vignette du fichier
978-3-642-32805-3_11_Chapter.pdf (365.5 Ko) Télécharger le fichier
Origin : Files produced by the author(s)
Loading...

Dates and versions

hal-01540898 , version 1 (16-06-2017)

Licence

Attribution

Identifiers

Cite

Steffen Wendzel, Jörg Keller. Systematic Engineering of Control Protocols for Covert Channels. 13th International Conference on Communications and Multimedia Security (CMS), Sep 2012, Canterbury, United Kingdom. pp.131-144, ⟨10.1007/978-3-642-32805-3_11⟩. ⟨hal-01540898⟩
51 View
91 Download

Altmetric

Share

Gmail Facebook X LinkedIn More