Abstract
Traditional covert channels study mainly focus on digital signature, operation system and multimedia technology. The covert channels in TCP/IP protocol suite have many advantages, such as they are harder to be detected and more robust. Two covert channels are discovered by using FTP protocol command sequence based on the study of FTP protocol. The principles of covert channels are analyzed. Three characters of covert channels, which are concealment, bandwidth and robustness, are studied. And the methods to construct covert channels are also applicable to other internet protocol.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Postel, J., Reynolds, J.: File Transfer Protocol (FTP). rfc 959 (1985)
Dahang, L.: The Research and Implementation of Covert Channel Based on Network Protocols. Computer Engineering and Application 02, 183–186 (2003) (in Chinese)
Schenier, B.: Applied Cryptography, protocols, algorithms, and source code in C, pp. 11–13. China Machine Press (2000) (in Chinese)
Giffin, J., Greenstadt, R., et al.: Covert messaging through TCP timestamps. Privacy En- hancing Technologies 2482, 194–208 (2003)
Singh, A., Nordstrom, O., et al.: Malicious ICMP tunneling: Defense against the vulnerability. In: Safavi-Naini, R., Seberry, J. (eds.) ACISP 2003. LNCS, vol. 2727, pp. 226–236. Springer, Heidelberg (2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Zou, Xg., Li, Q., Sun, SH., Niu, X. (2005). The Research on Information Hiding Based on Command Sequence of FTP Protocol. In: Khosla, R., Howlett, R.J., Jain, L.C. (eds) Knowledge-Based Intelligent Information and Engineering Systems. KES 2005. Lecture Notes in Computer Science(), vol 3683. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11553939_151
Download citation
DOI: https://doi.org/10.1007/11553939_151
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-28896-1
Online ISBN: 978-3-540-31990-0
eBook Packages: Computer ScienceComputer Science (R0)