Low-attention forwarding for mobile network covert channels

  • Authors:
  • Steffen Wendzel;Jörg Keller

  • Affiliations:
  • University of Hagen, Faculty of Mathematics and Computer Science, Hagen, Germany;University of Hagen, Faculty of Mathematics and Computer Science, Hagen, Germany

  • Venue:
  • CMS'11 Proceedings of the 12th IFIP TC 6/TC 11 international conference on Communications and multimedia security
  • Year:
  • 2011

Quantified Score

Hi-index 0.00

Visualization

Abstract

In a real-world network, different hosts involved in covert channel communication run different covert channel software as well as different versions of such software, i.e. these systems use different network protocols for a covert channel. A program that implements a network covert channel for mobile usage thus must be capable of utilizing multiple network protocols to deal with a number of different covert networks and hosts. We present calculation methods for utilizable header areas in network protocols, calculations for channel optimization, an algorithm to minimize a covert channel's overhead traffic, as well as implementationrelated solutions for such a mobile environment. By minimizing the channel's overhead depending on the set of supported protocols between mobile hosts, we also minimize the attention raised through the channel's traffic. We also show how existing covert network channel infrastructure can be modified without replacing all existing infrastructure elements by proposing the handling of backward-compatible software versions.