Abstract

Nowadays indirect communication is used as a mechanism to bypass the direct communication network channel. Such indirect communication channels prove as a threat to information-sensitive systems that don’t allow leakage of information like Military communication. Developing a covert channel in the network requires some carriers like TCP Headers or Protocols. The only challenge is that it possesses strict semantics. If it is manipulated by even a single bit, the entire semantics will change. The packet will be considered as a forged packet and will get rejected automatically by a firewall. To avoid this, we have proposed a unique way of covert commumcation - TCP and IPv6 Referencing Model. In our proposed referencing model, instead of embedding any bit and destroying the semantics of the header, we are going to use the referencing method to send the covert bit from sender to receiver end. Thus the packet will appear a part of normal distribution and gets transmitted securely within the channel. Here we are using the TCP Sequence Number (SQN) to make this possible.

Highlights

  • The communication channel is defined as a mechanism to transmit any message from the sender device to the predetermined host device

  • The question is which carrier to utilize for covert communications? Given in the present era, the choice of protocols, Internet Protocol version 4 (IPv4) currently, is one of the most pervasive protocols in deployment

  • The IPv6 is designed for the successor of IPV4

Read more

Summary

INTRODUCTION

The communication channel is defined as a mechanism to transmit any message from the sender device to the predetermined host device. The communication channels can be categorised into two: Overt and covert communication channels. The overt communication channel is defined as the mechanism which is followed ethically to establish communication between two communication devices. The covert communication channel is defined as the false mechanism that is followed by the devices to establish a communication channel between them. Given in the present era, the choice of protocols, Internet Protocol version 4 (IPv4) currently, is one of the most pervasive protocols in deployment. It has become a good carrier for covert channel exploits because of its use in most of the communication over the globe. The covert channel in IPv6 is more secure like buffer overflow attacks

2​ RELATED WORK
Receiver Module
4​.RESULT
1.Results
Findings
CONCLUSION
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.