A Hybrid Covert Channel Over LTE-A System
TLDR
The HyLTEsteg uses covert timing channels, which is fitted the legitimate data stream of network, as a trigger for covert storage channels (CSC), and the CSC utilizes the sequence number fields of Radio Link Control (RLC) layer and Packet Data Convergence Protocol (PDCP) layer to transmit hidden information.Abstract:
In this paper, we have analyzed the sub-protocol stack of Long Term Evolution Advanced (LTE-A) System, and proposed a hybrid covert channel, called HyLTEsteg, designed for LTE-A System. The HyLTEsteg uses covert timing channels (CTC), which is fitted the legitimate data stream of network, as a trigger for covert storage channels (CSC). And the CSC utilizes the sequence number (SN) fields of Radio Link Control (RLC) layer and Packet Data Convergence Protocol (PDCP) layer to transmit hidden information. The performance of the HyLTEsteg’s anti-detection and hidden information transmission are evaluated and analyzed. Keywords-LTE-A; covert channel; hidden information; capacity; transmission time intervalread more
References
More filters
Proceedings ArticleDOI
IP covert timing channels: design and detection
TL;DR: It is shown that the regularity of a timing channel can be used to differentiate it from other traffic and present two methods of doing so and measures of their efficiency.
Book ChapterDOI
Model-Based Covert Timing Channels: Automated Modeling and Evasion
TL;DR: An automated framework for building model-based covert timing channels, which exploit the statistical properties of legitimate network traffic to evade detection in an effective manner are designed and implemented.
Network covert channels: design, analysis, detection, and elimination
TL;DR: It is shown that traffic analysis can counter traditional event-based covert channels, which do not employ any additional scheme to obfuscate the channel further, and a new family of covert channels that do not produce such anomaly are introduced.
Proceedings ArticleDOI
Steganography in Long Term Evolution Systems
TL;DR: This paper contains a description and analysis of a new steganographic method, called LaTEsteg, designed for LTE (Long Term Evolution) systems, that allows users to gain additional data transfer that is invisible to unauthorized parties that are unaware of hidden communication.
Journal ArticleDOI
A novel automated framework for modeling and evaluating covert channel algorithms
TL;DR: The proposed framework, Automated Covert Channel Modeling ACCM, can provide a reliable and valid implementation method for fully functional covert communication techniques that can be used to study various concepts, characteristics and features of covert communication.