Figure 11: InCC option costs.
6 CONCLUSIONS
This article presents a light-weight library for covert
channels, capable of communicating with other sys-
tems from different networks. By using the options
described in the previous sections the channel is ca-
pable of sending information to other systems without
compromising their existence. The channel is modu-
lar and any of the options can be configured indepen-
dently. The source code is under the terms of the GPL
and is available on https://github.com/camp0/incc.
We propose a new technique which evades detec-
tion by camouflaging the flows with the existing ones
on the network. InCC was designed for UDP traffic in
order to check the viability of its implementation and
test its functionality. However, it would be possible to
extend it to TCP flows in order to camouflage the gen-
erated flows with the ones detected on the network.
Many P2P applications send packet garbage in or-
der to disrupt the traffic analysis of the ISP networks.
One possible extension to InCC is the production of
fake datagrams to disturb all sorts of analysis during
the transmission of InCC flows. When there is not
enough traffic for InCC to identify, the administrators
could install P2P applications in order to help camou-
flage the InCC flows, thus making the channel more
resilient and robust.
ACKNOWLEDGEMENTS
This work has been partially funded by Vulcano
project (ref 442808215-8215-4-9) funded by Spanish
ministry of Science and Innovation.
REFERENCES
5200.28-STD, D. (1985). Trusted Computer System Evalu-
ation Criteria. Dod Computer Security Center.
BitTorrent (2013). The bittorrent protocol specifi-
cation, version 11031. http://bittorrent.org/beps/
bep
0003.html.
Burnett, S., Feamster, N., and Vempala, S. (2010). Chip-
ping away at censorship firewalls with user-generated
content. In Proceedings of the 19th USENIX confer-
ence on Security, USENIX Security’10, pages 29–29,
Berkeley, CA, USA. USENIX Association.
Degraaf, R., Aycock, J., and Jacobson, M. (2005). Improved
port knocking with strong authentication. In In Proc.
21st Annual Computer Security Applications Confer-
ence (ACSAC 2005, pages 409–418. Springer.
Dittmann, J., Hesse, D., and Hillert, R. (2005). Steganog-
raphy and steganalysis in voice-over ip scenarios: op-
erational aspects and first experiences with a new ste-
ganalysis tool set. In Delp, E. J. and Wong, P. W.,
editors, Security, Steganography, and Watermarking
of Multimedia Contents, volume 5681 of Proceedings
of SPIE, pages 607–618. SPIE.
Freire, E. P., Ziviani, A., and Salles, R. M. (2009). On met-
rics to distinguish skype flows from http traffic. J.
Network Syst. Manage., 17(1-2):53–72.
Fu, X., Guan, Y., Graham, B., Bettati, R., and Zhao, W.
(2002). Using parasite flows to camouflage flow traf-
fic. In Proceedings of the 2002 IEEE Workshop on
Information Assurance.
Hippie (2013). Hi-performance protocol identification en-
gine. http://sourceforge.net/projects/hippie/.
Klein, A. (2008). Attacks on the rc4 stream cipher. Des.
Codes Cryptography, 48(3):269–286.
Liu, Y., Ghosal, D., Armknecht, F., Sadeghi, A.-R., Schulz,
S., and Katzenbeisser, S. (2009). Hide and seek in
time - robust covert timing channels. In Backes,
M. and Ning, P., editors, ESORICS, volume 5789 of
Lecture Notes in Computer Science, pages 120–135.
Springer.
Llamas, D., Miller, A., and Allison, C. (2005). An eval-
uation framework for the analysis of covert channels
in the tcp/ip protocol suite. In ECIW, pages 205–214.
Academic Conferences Limited, Reading, UK.
Lucena, N. B., Pease, J., Yadollahpour, P., and Chapin, S. J.
(2004). Syntax and semantics-preserving application-
layer protocol steganography. In Proceedings of the
6th Information Hiding Workshop, pages 164–169.
Luo, X., Chan, E. W. W., and Chang, R. K. C. (2009).
Clack: A network covert channel based on partial ac-
knowledgment encoding. In ICC, pages 1–5. IEEE.
Mantin, I. (2005). Predicting and distinguishing attacks on
rc4 keystream generator. In EUROCRYPT,pages 491–
506.
Mazurczyk, W. and Szczypiorski, K. (2009). Steganog-
raphy in handling oversized ip packets. CoRR,
abs/0907.0313.
Miklosovic, S. (2011). Pa018 - term project - port knocking
enhancements. http://www.portknocking.org/view/
resources.
InCC:HidingInformationbyMimickingTrafficInNetworkFlows
13