Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

The Research on Information Hiding Based on Command Sequence of FTP Protocol

  • Conference paper
Knowledge-Based Intelligent Information and Engineering Systems (KES 2005)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 3683))

Abstract

Traditional covert channels study mainly focus on digital signature, operation system and multimedia technology. The covert channels in TCP/IP protocol suite have many advantages, such as they are harder to be detected and more robust. Two covert channels are discovered by using FTP protocol command sequence based on the study of FTP protocol. The principles of covert channels are analyzed. Three characters of covert channels, which are concealment, bandwidth and robustness, are studied. And the methods to construct covert channels are also applicable to other internet protocol.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Postel, J., Reynolds, J.: File Transfer Protocol (FTP). rfc 959 (1985)

    Google Scholar 

  2. Dahang, L.: The Research and Implementation of Covert Channel Based on Network Protocols. Computer Engineering and Application 02, 183–186 (2003) (in Chinese)

    Google Scholar 

  3. Schenier, B.: Applied Cryptography, protocols, algorithms, and source code in C, pp. 11–13. China Machine Press (2000) (in Chinese)

    Google Scholar 

  4. Giffin, J., Greenstadt, R., et al.: Covert messaging through TCP timestamps. Privacy En- hancing Technologies 2482, 194–208 (2003)

    Article  Google Scholar 

  5. Singh, A., Nordstrom, O., et al.: Malicious ICMP tunneling: Defense against the vulnerability. In: Safavi-Naini, R., Seberry, J. (eds.) ACISP 2003. LNCS, vol. 2727, pp. 226–236. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Zou, Xg., Li, Q., Sun, SH., Niu, X. (2005). The Research on Information Hiding Based on Command Sequence of FTP Protocol. In: Khosla, R., Howlett, R.J., Jain, L.C. (eds) Knowledge-Based Intelligent Information and Engineering Systems. KES 2005. Lecture Notes in Computer Science(), vol 3683. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11553939_151

Download citation

  • DOI: https://doi.org/10.1007/11553939_151

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-28896-1

  • Online ISBN: 978-3-540-31990-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics