Hybrid Covert Channel an Obliterate for Information Hiding
In a prisoners’ problem there are two individuals attempt to communicate covertly without alerting a “warden” who controls the communications channel. This problem becomes more or less difficult because of various assumptions or requirements. One assumpti
- PDF / 211,826 Bytes
- 5 Pages / 439.37 x 666.142 pts Page_size
- 13 Downloads / 218 Views
Hybrid Covert Channel an Obliterate for Information Hiding Rajeshwari Goudar and Pournima More
Abstract In a prisoners’ problem there are two individuals attempt to communicate covertly without alerting a ‘‘warden’’ who controls the communications channel. This problem becomes more or less difficult because of various assumptions or requirements. One assumption which makes the problem considerably more manageable is that the participants are allowed to share some secret information such as an encryption key prior to imprisonment. Another assumption, which makes the problem much more difficult, is that the warden be allowed to modify as well as read the messages sent between the prisoners. This paper describes Hybrid Covert Channel techniques, in which no secret information needs to be shared before imprisonment. In this case if the warden is not allowed to modify the contents of the channel, a modification of an existing protocol will be shown to admit pure steganography. Then, a technique is described that allows pure steganography between two prisoners in the presence of an active contentmodifying warden. This technique is possible through the use of two distinct channels rather than one: the subliminal channel for steganographic communication which is augmented by a supraliminal channel, one in which information is not hidden from the warden but cannot be modified.
Keywords Subliminal channel Covert channel Noisy channel Hybrid covert channel
R. Goudar (&) P. More Computer Department, MAE Alandi, University of Pune, Maharashtra, 411015, India e-mail: [email protected]
V. V. Das (ed.), Proceedings of the Third International Conference on Trends in Information, Telecommunication and Computing, Lecture Notes in Electrical Engineering 150, DOI: 10.1007/978-1-4614-3363-7_73, Ó Springer Science+Business Media New York 2013
609
610
R. Goudar and P. More
73.1 Introduction In prisoner’s problem, two people usually named Sender and Receiver, are in prison and intend to an escape plan. The problem is that all communication between them is through Warden. Sender and Receiver must send hidden information which is inconspicuous and cannot be noticed by Warden. Inconspicuous data is used to hide the real message which is usually referred as cover data.
73.2 Literature Review Hybrid covert channel is composition of two or more variants of Covert Channel, either active at same instance or at different instances of time. It is impossible to completely assess the number of covert channels involved in a hybrid composition and it may be more complex if hybrid covert channel behaves as multi-trapdoor and protocol hopped, Here, Hybrid Covert Channel is visualizing as a combination of noisy channel in TCP and subliminal channel in SSL, both being transport layer protocols.
73.3 Proposed System: Hybrid Covert Channel Covert channels can be considered as one of the main sub disciplines of data hiding. In data hiding, the two communicating parties are allowed to communicate with each other based on the security po
Data Loading...