Introducing P2P architecture in adaptive covert communication system

Fedor V. Yarochkin, Shih Yao Dai, Chih Hung Lin, Yennun Huang, Sy Yen Kuo

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

5 Scopus citations

Abstract

Covert channels are secret communication paths, which existance is not expected in the original system design. Covert channels can be used as legimate tools of censorship resistance, anonimity and privacy preservation to address issues with "national" firewalls, citizen profiling and other "unethical" uses of Information Technology. Current steganographic methods that implement covert channels within network traffic, are highly dependent on particular media data or network protocol to hide data. In this paper we investigate the methods and an algorithm for implementing adaptive covert communication system that works on real-world Internet, capable of using multiple application-level protocols as its communication media and can be implemented as network application, therefore requires no system modifications of communicating nodes. The key difference from previous solutions is the use of adaptive redundant mechanism, which allows real-time underlying protocol switching and adaptation to the dynamic network configuration changes. Further, covert channels can be extended with p2p architecture in order to improve channel ressistance.

Original languageEnglish
Title of host publication1st South Central Asian Himalayas Regional IEEE/IFIP International Conference on Internet, AH-ICI 2009
DOIs
StatePublished - 2009
Externally publishedYes
Event1st South Central Asian Himalayas Regional IEEE/IFIP International Conference on Internet, AH-ICI 2009 - Kathmundu, Nepal
Duration: 03 11 200905 11 2009

Publication series

Name1st South Central Asian Himalayas Regional IEEE/IFIP International Conference on Internet, AH-ICI 2009

Conference

Conference1st South Central Asian Himalayas Regional IEEE/IFIP International Conference on Internet, AH-ICI 2009
Country/TerritoryNepal
CityKathmundu
Period03/11/0905/11/09

Keywords

  • Covert-channels
  • p2p
  • Self-adaptation and self-organization
  • Steganography

Fingerprint

Dive into the research topics of 'Introducing P2P architecture in adaptive covert communication system'. Together they form a unique fingerprint.

Cite this