Advertisement

The Research on Information Hiding Based on Command Sequence of FTP Protocol

  • Xin-guang Zou
  • Qiong Li
  • Sheng-He Sun
  • Xiamu Niu
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3683)

Abstract

Traditional covert channels study mainly focus on digital signature, operation system and multimedia technology. The covert channels in TCP/IP protocol suite have many advantages, such as they are harder to be detected and more robust. Two covert channels are discovered by using FTP protocol command sequence based on the study of FTP protocol. The principles of covert channels are analyzed. Three characters of covert channels, which are concealment, bandwidth and robustness, are studied. And the methods to construct covert channels are also applicable to other internet protocol.

Keywords

Information Hiding Covert Channel Application Protocol Multimedia Technology File Transfer Protocol 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Postel, J., Reynolds, J.: File Transfer Protocol (FTP). rfc 959 (1985)Google Scholar
  2. 2.
    Dahang, L.: The Research and Implementation of Covert Channel Based on Network Protocols. Computer Engineering and Application 02, 183–186 (2003) (in Chinese)Google Scholar
  3. 3.
    Schenier, B.: Applied Cryptography, protocols, algorithms, and source code in C, pp. 11–13. China Machine Press (2000) (in Chinese)Google Scholar
  4. 4.
    Giffin, J., Greenstadt, R., et al.: Covert messaging through TCP timestamps. Privacy En- hancing Technologies 2482, 194–208 (2003)CrossRefGoogle Scholar
  5. 5.
    Singh, A., Nordstrom, O., et al.: Malicious ICMP tunneling: Defense against the vulnerability. In: Safavi-Naini, R., Seberry, J. (eds.) ACISP 2003. LNCS, vol. 2727, pp. 226–236. Springer, Heidelberg (2003)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2005

Authors and Affiliations

  • Xin-guang Zou
    • 1
  • Qiong Li
    • 1
  • Sheng-He Sun
    • 1
  • Xiamu Niu
    • 1
  1. 1.Information Countermeasure Research InstituteHarbin Institute of TechnologyP.R.C.

Personalised recommendations