Research on Covert Channels Based on Multiple Networks

被引:0
作者
Zhang, Dongyan [1 ]
Du, Pingxin [1 ]
Yang, Zhiwen [1 ]
Dong, Lan [2 ]
机构
[1] Univ Sci & Technol Beijing, Sch Comp Sci & Technol, 30 Xueyuan Rd, Beijing 100083, Peoples R China
[2] Beijing Jiaotong Univ Beijing, Sch Comp & Informat Technol, Beijing, Peoples R China
来源
WEB TECHNOLOGIES AND APPLICATIONS, APWEB 2014, PT II | 2014年 / 8710卷
关键词
Covert Channel; Multi-network; One-time pad; WiFi; 3G;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Covert channel is a kind of method, used to transmit message secretly usually. Till now, most covert channel uses one network with protocol header or filter bits, time interval of packets etc. With the development of networks, using multiple networks transmit data getting more common. In this paper, a new kind of covert channel is proposed using multi-networks to transmit ciphertext. One is used to transmit key, and the others are used to transmit ciphertext. In the experiment, the key is transmitted with 3G network, while the cipher using WiFi network in the covert channel. For making the covert channel more robust, we use one time padding to encrypt our message. We also measure the accuracy with different transmission speed. The result shows that the covert channel we propose has high accuracy with different transmission speed.
引用
收藏
页码:365 / 375
页数:11
相关论文
共 17 条
[1]  
Ahmadzadeh SA, 2013, IEEE INFOCOM SER, P2031
[2]  
Chen SY, 2013, 2013 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), P1291
[3]  
Gondi V. K., 2010, Proceedings of the 2010 Asia-Pacific Services Computing Conference (APSCC 2010), P548, DOI 10.1109/APSCC.2010.96
[4]  
Guo Yunchuan, 2010, Proceedings of the 2010 IEEE 10th International Conference on Computer and Information Technology (CIT 2010), P589, DOI 10.1109/CIT.2010.122
[5]  
Hashim F., 2010, IEEE Transactions on Network and Service Management, V7, P268, DOI 10.1109/TNSM.2010.1012.0360
[6]  
Jadhav M. V., 2011, 2011 Proceedings of International Conference on Emerging Trends in Electrical and Computer Technology (ICETECT 2011), P1123, DOI 10.1109/ICETECT.2011.5760288
[7]  
Lalande Jean-Francois, 2013, 2013 International Conference on Availability, Reliability and Security (ARES), P701, DOI 10.1109/ARES.2013.92
[8]  
Okhravi H., 2010, 2010 IEEE International Conference on Technologies for Homeland Security (HST 2010), P481, DOI 10.1109/THS.2010.5654967
[9]  
[强亮 Qiang Liang], 2005, [计算机工程, Computer Engineering], V31, P224
[10]  
Qixiang W., 2009, INFORM SECURITY COMM, V1, P73