Towards adaptive covert communication system

Fedor V. Yarochkin, Shih Yao Dai, Chih Hung Lin, Yennun Huang, Sy Yen Kuo*

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

15 Scopus citations

Abstract

Covert channels are secret communication paths, which existance is not expected in the original system design. Covert channels can be used as legimate tools of censorship resistance, anonimity and privacy preservation to address issues with "national" firewalls, citizen profiling and other "unethical" uses of Information Technology. Current steganographic methods that implement covert channels within network traffic, are highly dependent on particular media data or network protocol to hide data. In this paper we investigate the methods and an algorithm for implementing adaptive covert communication system that works on real-world Internet, capable of using multiple application-level protocols as its communication media and can be implemented as network application, therefore requires no system modifications of communicating nodes. The key difference from previous solutions is the use of adaptive redundant mechanism, which allows real-time underlying protocol switching and adaptation to the dynamic network configuration changes.

Original languageEnglish
Title of host publicationProceedings of the 14th IEEE Pacific Rim International Symposium on Dependable Computing, PRDC 2008
Pages153-159
Number of pages7
DOIs
StatePublished - 2008
Externally publishedYes
Event14th IEEE Pacific Rim International Symposium on Dependable Computing, PRDC 2008 - Taipei, Taiwan
Duration: 15 12 200817 12 2008

Publication series

NameProceedings of the 14th IEEE Pacific Rim International Symposium on Dependable Computing, PRDC 2008

Conference

Conference14th IEEE Pacific Rim International Symposium on Dependable Computing, PRDC 2008
Country/TerritoryTaiwan
CityTaipei
Period15/12/0817/12/08

Keywords

  • Covert-channels
  • Self-adaptation and self-organization
  • Steganography

Fingerprint

Dive into the research topics of 'Towards adaptive covert communication system'. Together they form a unique fingerprint.

Cite this