The Research on Information Hiding Based on Command Sequence of FTP Protocol
Traditional covert channels study mainly focus on digital signature, operation system and multimedia technology. The covert channels in TCP/IP protocol suite have many advantages, such as they are harder to be detected and more robust. Two covert channels are discovered by using FTP protocol command sequence based on the study of FTP protocol. The principles of covert channels are analyzed. Three characters of covert channels, which are concealment, bandwidth and robustness, are studied. And the methods to construct covert channels are also applicable to other internet protocol.
Unable to display preview. Download preview PDF.
- 1.Postel, J., Reynolds, J.: File Transfer Protocol (FTP). rfc 959 (1985)Google Scholar
- 2.Dahang, L.: The Research and Implementation of Covert Channel Based on Network Protocols. Computer Engineering and Application 02, 183–186 (2003) (in Chinese)Google Scholar
- 3.Schenier, B.: Applied Cryptography, protocols, algorithms, and source code in C, pp. 11–13. China Machine Press (2000) (in Chinese)Google Scholar