Covert Channel Construction Method Based on HTTP Composite Protocols

Aiming at the problems of low concealment of existing storage-type covert channels, high bit error rate, and low transmission rate of time-type covert channels, this paper proposes a method of constructing covert channels based on HTTP protocol combination. The method simulates browser application t...

Full description

Saved in:
Bibliographic Details
Main Authors: Longxing Jin, Zijun Liu, Fuquan Huang, Zizhao Lin, Ming Li
Format: Article
Language:English
Published: Wiley 2022-01-01
Series:Journal of Electrical and Computer Engineering
Online Access:http://dx.doi.org/10.1155/2022/2257524
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1832554929472929792
author Longxing Jin
Zijun Liu
Fuquan Huang
Zizhao Lin
Ming Li
author_facet Longxing Jin
Zijun Liu
Fuquan Huang
Zizhao Lin
Ming Li
author_sort Longxing Jin
collection DOAJ
description Aiming at the problems of low concealment of existing storage-type covert channels, high bit error rate, and low transmission rate of time-type covert channels, this paper proposes a method of constructing covert channels based on HTTP protocol combination. The method simulates browser application to send HTTP requests, dynamically distributes HTTP requests to different browsers, embeds hidden information by mathematical combination, and dynamically adjusts access objects, data packet time interval, and data packet length, thus improving the concealment of the channel. At the same time, the channel is based on the reliable transmission inside TCP protocol so that it is not affected by network jitter, thus ensuring the reliability of the channel. Experimental results show that this method can resist the detection method based on application signature, protocol fingerprint detection method, and combination model detection method, and has strong concealment. It can adjust the concealment and channel capacity according to the application scenario.
format Article
id doaj-art-0bbe464ed4a3422ba2dcf90824530de3
institution Kabale University
issn 2090-0155
language English
publishDate 2022-01-01
publisher Wiley
record_format Article
series Journal of Electrical and Computer Engineering
spelling doaj-art-0bbe464ed4a3422ba2dcf90824530de32025-02-03T05:50:03ZengWileyJournal of Electrical and Computer Engineering2090-01552022-01-01202210.1155/2022/2257524Covert Channel Construction Method Based on HTTP Composite ProtocolsLongxing Jin0Zijun Liu1Fuquan Huang2Zizhao Lin3Ming Li4Department of System OperationDepartment of System OperationDepartment of System OperationDepartment of System OperationIndustry Information Security CenterAiming at the problems of low concealment of existing storage-type covert channels, high bit error rate, and low transmission rate of time-type covert channels, this paper proposes a method of constructing covert channels based on HTTP protocol combination. The method simulates browser application to send HTTP requests, dynamically distributes HTTP requests to different browsers, embeds hidden information by mathematical combination, and dynamically adjusts access objects, data packet time interval, and data packet length, thus improving the concealment of the channel. At the same time, the channel is based on the reliable transmission inside TCP protocol so that it is not affected by network jitter, thus ensuring the reliability of the channel. Experimental results show that this method can resist the detection method based on application signature, protocol fingerprint detection method, and combination model detection method, and has strong concealment. It can adjust the concealment and channel capacity according to the application scenario.http://dx.doi.org/10.1155/2022/2257524
spellingShingle Longxing Jin
Zijun Liu
Fuquan Huang
Zizhao Lin
Ming Li
Covert Channel Construction Method Based on HTTP Composite Protocols
Journal of Electrical and Computer Engineering
title Covert Channel Construction Method Based on HTTP Composite Protocols
title_full Covert Channel Construction Method Based on HTTP Composite Protocols
title_fullStr Covert Channel Construction Method Based on HTTP Composite Protocols
title_full_unstemmed Covert Channel Construction Method Based on HTTP Composite Protocols
title_short Covert Channel Construction Method Based on HTTP Composite Protocols
title_sort covert channel construction method based on http composite protocols
url http://dx.doi.org/10.1155/2022/2257524
work_keys_str_mv AT longxingjin covertchannelconstructionmethodbasedonhttpcompositeprotocols
AT zijunliu covertchannelconstructionmethodbasedonhttpcompositeprotocols
AT fuquanhuang covertchannelconstructionmethodbasedonhttpcompositeprotocols
AT zizhaolin covertchannelconstructionmethodbasedonhttpcompositeprotocols
AT mingli covertchannelconstructionmethodbasedonhttpcompositeprotocols