Covert Channel Construction Method Based on HTTP Composite Protocols
Aiming at the problems of low concealment of existing storage-type covert channels, high bit error rate, and low transmission rate of time-type covert channels, this paper proposes a method of constructing covert channels based on HTTP protocol combination. The method simulates browser application t...
Saved in:
Main Authors: | , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Wiley
2022-01-01
|
Series: | Journal of Electrical and Computer Engineering |
Online Access: | http://dx.doi.org/10.1155/2022/2257524 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1832554929472929792 |
---|---|
author | Longxing Jin Zijun Liu Fuquan Huang Zizhao Lin Ming Li |
author_facet | Longxing Jin Zijun Liu Fuquan Huang Zizhao Lin Ming Li |
author_sort | Longxing Jin |
collection | DOAJ |
description | Aiming at the problems of low concealment of existing storage-type covert channels, high bit error rate, and low transmission rate of time-type covert channels, this paper proposes a method of constructing covert channels based on HTTP protocol combination. The method simulates browser application to send HTTP requests, dynamically distributes HTTP requests to different browsers, embeds hidden information by mathematical combination, and dynamically adjusts access objects, data packet time interval, and data packet length, thus improving the concealment of the channel. At the same time, the channel is based on the reliable transmission inside TCP protocol so that it is not affected by network jitter, thus ensuring the reliability of the channel. Experimental results show that this method can resist the detection method based on application signature, protocol fingerprint detection method, and combination model detection method, and has strong concealment. It can adjust the concealment and channel capacity according to the application scenario. |
format | Article |
id | doaj-art-0bbe464ed4a3422ba2dcf90824530de3 |
institution | Kabale University |
issn | 2090-0155 |
language | English |
publishDate | 2022-01-01 |
publisher | Wiley |
record_format | Article |
series | Journal of Electrical and Computer Engineering |
spelling | doaj-art-0bbe464ed4a3422ba2dcf90824530de32025-02-03T05:50:03ZengWileyJournal of Electrical and Computer Engineering2090-01552022-01-01202210.1155/2022/2257524Covert Channel Construction Method Based on HTTP Composite ProtocolsLongxing Jin0Zijun Liu1Fuquan Huang2Zizhao Lin3Ming Li4Department of System OperationDepartment of System OperationDepartment of System OperationDepartment of System OperationIndustry Information Security CenterAiming at the problems of low concealment of existing storage-type covert channels, high bit error rate, and low transmission rate of time-type covert channels, this paper proposes a method of constructing covert channels based on HTTP protocol combination. The method simulates browser application to send HTTP requests, dynamically distributes HTTP requests to different browsers, embeds hidden information by mathematical combination, and dynamically adjusts access objects, data packet time interval, and data packet length, thus improving the concealment of the channel. At the same time, the channel is based on the reliable transmission inside TCP protocol so that it is not affected by network jitter, thus ensuring the reliability of the channel. Experimental results show that this method can resist the detection method based on application signature, protocol fingerprint detection method, and combination model detection method, and has strong concealment. It can adjust the concealment and channel capacity according to the application scenario.http://dx.doi.org/10.1155/2022/2257524 |
spellingShingle | Longxing Jin Zijun Liu Fuquan Huang Zizhao Lin Ming Li Covert Channel Construction Method Based on HTTP Composite Protocols Journal of Electrical and Computer Engineering |
title | Covert Channel Construction Method Based on HTTP Composite Protocols |
title_full | Covert Channel Construction Method Based on HTTP Composite Protocols |
title_fullStr | Covert Channel Construction Method Based on HTTP Composite Protocols |
title_full_unstemmed | Covert Channel Construction Method Based on HTTP Composite Protocols |
title_short | Covert Channel Construction Method Based on HTTP Composite Protocols |
title_sort | covert channel construction method based on http composite protocols |
url | http://dx.doi.org/10.1155/2022/2257524 |
work_keys_str_mv | AT longxingjin covertchannelconstructionmethodbasedonhttpcompositeprotocols AT zijunliu covertchannelconstructionmethodbasedonhttpcompositeprotocols AT fuquanhuang covertchannelconstructionmethodbasedonhttpcompositeprotocols AT zizhaolin covertchannelconstructionmethodbasedonhttpcompositeprotocols AT mingli covertchannelconstructionmethodbasedonhttpcompositeprotocols |