scispace - formally typeset
Open AccessProceedings ArticleDOI

A Hybrid Covert Channel Over LTE-A System

TLDR
The HyLTEsteg uses covert timing channels, which is fitted the legitimate data stream of network, as a trigger for covert storage channels (CSC), and the CSC utilizes the sequence number fields of Radio Link Control (RLC) layer and Packet Data Convergence Protocol (PDCP) layer to transmit hidden information.
Abstract
In this paper, we have analyzed the sub-protocol stack of Long Term Evolution Advanced (LTE-A) System, and proposed a hybrid covert channel, called HyLTEsteg, designed for LTE-A System. The HyLTEsteg uses covert timing channels (CTC), which is fitted the legitimate data stream of network, as a trigger for covert storage channels (CSC). And the CSC utilizes the sequence number (SN) fields of Radio Link Control (RLC) layer and Packet Data Convergence Protocol (PDCP) layer to transmit hidden information. The performance of the HyLTEsteg’s anti-detection and hidden information transmission are evaluated and analyzed. Keywords-LTE-A; covert channel; hidden information; capacity; transmission time interval

read more

Content maybe subject to copyright    Report

References
More filters
Proceedings ArticleDOI

IP covert timing channels: design and detection

TL;DR: It is shown that the regularity of a timing channel can be used to differentiate it from other traffic and present two methods of doing so and measures of their efficiency.
Book ChapterDOI

Model-Based Covert Timing Channels: Automated Modeling and Evasion

TL;DR: An automated framework for building model-based covert timing channels, which exploit the statistical properties of legitimate network traffic to evade detection in an effective manner are designed and implemented.

Network covert channels: design, analysis, detection, and elimination

TL;DR: It is shown that traffic analysis can counter traditional event-based covert channels, which do not employ any additional scheme to obfuscate the channel further, and a new family of covert channels that do not produce such anomaly are introduced.
Proceedings ArticleDOI

Steganography in Long Term Evolution Systems

TL;DR: This paper contains a description and analysis of a new steganographic method, called LaTEsteg, designed for LTE (Long Term Evolution) systems, that allows users to gain additional data transfer that is invisible to unauthorized parties that are unaware of hidden communication.
Journal ArticleDOI

A novel automated framework for modeling and evaluating covert channel algorithms

TL;DR: The proposed framework, Automated Covert Channel Modeling ACCM, can provide a reliable and valid implementation method for fully functional covert communication techniques that can be used to study various concepts, characteristics and features of covert communication.
Related Papers (5)