International Conference on Recent Trends in Information Technology and Computer Science |
Foundation of Computer Science USA |
ICRTITCS - Number 1 |
March 2012 |
Authors: D. M. Dakhane, Swapna Patil, Mahendra Patil |
c36ff396-fe92-4c7f-9855-803a64f1932f |
D. M. Dakhane, Swapna Patil, Mahendra Patil . Detection and elimination of covert communication in Transport and Internet layer � A Survey. International Conference on Recent Trends in Information Technology and Computer Science. ICRTITCS, 1 (March 2012), 36-41.
Covert channels use stealth communications to compromise the security policies of systems. They constitute an important security threat since they can be used to exfiltrate confidential data from networks. TCP/IP protocols are used everyday and are subject to covert channels problems. Covert channels are used for the secret transfer of information. Encryption only protects communication from being decoded by unauthorized parties, whereas covert channels aim to hide the very existence of the communication. Initially, covert channels were identified as a security threat on monolithic systems i.e. mainframes. More recently focus has shifted towards covert channels in computer network protocols. The huge amount of data and vast number of different protocols in the Internet seems ideal as a high-bandwidth vehicle for covert communication. The aim of this paper is to give an overview of covert channels in TCP/IP networks. We briefly describe the TCP and IP protocols, present the different types of covert channels and the methods to set them up in TCP/IP networks; then we study the existing methods to detect and eliminate covert channels.