has no influence upon security. Then if
the allowable error level in the covert channel
0.5
error
p ≤ the parameter of counteraction tool a
should be
max
()1
.
2
error
H
Lp
a
νζ
+−
=
(29)
If there are no restrictions on the error level the
parameter of counteraction tool a should be
max
1
2
L
a
ν
=−
.
(30)
Therefore, we propose quantitative characteristics
of a technique to limit a covert channel capacity that
allows decreasing it to a given critical value. This is
practically useful since e.g. the functioning of a
covert channel with capacity less than 100 bits per sec
can be acceptable in some cases.
5 CONCLUSIONS
In this work, the capacity of network covert channels
was estimated using the information theory
statements. The counteraction tool utilizes dummy
packets generation and random increase of packets
lengths. The authors suggested a technique to select
the parameter of the counteraction tool when an
allowable covert channel capacity is given. The
novelty of the method is that the capacity of covert
channel is limited in advance in contrast to the other
approaches, which detect the active covert channel.
REFERENCES
Ahsan, K., Kundur, D., 2002. Practical data hiding in
TCP/IP. In Proc. of the 2002 ACM Multimedia and
security workshop.
Berk, V., Giani, A., Cybenko, G., 2005. Detection of covert
channel encoding in network packet delays: Technical
report TR2005-536. New Hampshire: Thayer school of
engineering of Dartmouth College.
Bovy, C.J., Mertodimedjo, H.T., Hooghiemstra, G.,
Uijterwaal, H., Mieghem, Van P., 2002. Analysis of
end-to-end delay measurements in Internet. In Proc. of
ACM Conference Passive and Active Measurements.
Cabuk, S., Brodley, C.E., Shields, C. 2004. IP covert timing
channels: design and detection. In Proc. of the 11th
ACM conference on computer and communications
security, pp. 178–187.
Department of defence trusted computer system evaluation
criteria, 1985. Department of defence standard.
Edekar, S., Goudar, R., 2013. Capacity boost with data
security in network protocol covert channel. In
Computer engineering and intelligent systems, Vol. 4,
No. 5, pp. 55–59.
Fisk, G., Fisk, M., Papadopoulos, C., Neil, J., 2002.
Eliminating steganography in Internet traffic with
active wardens. In Proc. of the fifth International
workshop on information hiding, pp. 18–35.
Girling, C.G., 1987. Covert channels in LAN’s. In IEEE
Transactions on software engineering, Vol. 13, No. 2,
pp. 292–296.
Grusho, A.A., 1999. On the existence of hidden channels.
In Discrete mathematics and applications, Vol. 11, No.
1, pp. 24-28.
Handel, T., Sandford, M., 1996. Hiding data in the OSI
network model. In: Proc. of the first International
workshop on information hiding, pp. 23–38.
Hussain, Mehdi, Hussain, M., 2011. A high bandwidth
covert channel in network protocol. In Proc. of the 2011
International conference on information and
communication technologies, pp. 1–6.
Ji, L., Liang, H., Song, Y., Niu, X., 2009a. A normal-traffic
network covert channel. In Proc. of the 2009
International conference on computational intelligence
and security, pp. 499–503.
Ji, L., Jiang, W., Dai, B., Niu, X., 2009b. A novel covert
channel based on length of messages. In Proc. of the
2009 Symposium on information engineering and
electronic commerce, pp. 551–554.
Kiraly, C., Teofili, S., Bianchi, G., Cigno, R. Lo, Nardelli,
M., Delzeri, E., 2008. Traffic flow confidentiality in
IPsec: protocol and implementation. In The
International federation for information processing,
Vol. 262, pp. 311–324.
Kundur, D., Ahsan, K., 2003. Practical Internet
steganography: data hiding in IP. In Proc. of the 2003
Texas workshop on security of information systems.
Lampson, B.W., 1973. A Note on the Confinement
Problem. In
Communications of the ACM, pp. 613–615.
Millen, J.K., 1987. Covert channel capacity In Proc. of the
IEEE Symposium on Security and Privacy, pp. 60–66.
Padlipsky, M.A., Snow, D.W., Karger, P.A., 1978.
Limitations of end-to-end encryption in secure
computer networks: Technical report ESD-TR-78-158.
Massachusetts: The MITRE Corporation.
Sellke, S.H., Wang, C.-C., Bagchi S., Shroff N.B., 2009.
Covert TCP/IP timing channels: theory to
implementation. In Proc. of the 28th Conference on
computer communications, pp. 2204–2212.
Shah, G., Molina, A., Blaze, M., 2009. Keyboards and
covert channels. In Proc. of the 15th USENIX Security
symposium, pp. 59–75.