Implementation of an ICMP-based covert channel for file and message transfer

Zouheir Trabelsi, Wassim El-Hajj, Safuat Hamdy

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Citations (Scopus)

Abstract

Covert channels exist in most communications systems and allow individuals to communicate truly undetectable. However, covert channels are rarely used due to their complexity. This article presents a novel covert channel based on record route IP header options for downloading and uploading text files and sending short messages. The presence of hidden texts and messages exchanged over the proposed covert channel will be unnoticed unless the IP header options are inspected. A tool has been implemented based on the proposed covert channel. It uses a client/server technology to offer a hidden version of the well known File Transfer Protocol (FTP) service. This service is called Hidden File Transfer Protocol (HFTP). In addition, the tool offers a hidden SMS service (HSMS) allowing to send hidden short messages.

Original languageEnglish
Title of host publicationProceedings of the 15th IEEE International Conference on Electronics, Circuits and Systems, ICECS 2008
Pages894-897
Number of pages4
DOIs
Publication statusPublished - 2008
Event15th IEEE International Conference on Electronics, Circuits and Systems, ICECS 2008 - St. Julian's, Malta
Duration: Aug 31 2008Sept 3 2008

Publication series

NameProceedings of the 15th IEEE International Conference on Electronics, Circuits and Systems, ICECS 2008

Other

Other15th IEEE International Conference on Electronics, Circuits and Systems, ICECS 2008
Country/TerritoryMalta
CitySt. Julian's
Period8/31/089/3/08

Keywords

  • Covert channel
  • Hidden File Transfer Protocol (HFTP)
  • Hidden SMS (HSMS)
  • Record route IP header option

ASJC Scopus subject areas

  • Electrical and Electronic Engineering

Fingerprint

Dive into the research topics of 'Implementation of an ICMP-based covert channel for file and message transfer'. Together they form a unique fingerprint.

Cite this