Information Hiding Techniques Using Network Protocols

The covert channels of type covert storage channels were used in this research to hide textual data or an (image hiding secrete data) in the transmission protocol layer and the internet protocol layer of TCP/IP module. We use IP protocol in designing covert channel by using Identification field, and...

Full description

Bibliographic Details
Main Authors: Manar Kashmola, Ameera Sallo
Format: Article
Language:Arabic
Published: Mosul University 2011-12-01
Series:Al-Rafidain Journal of Computer Sciences and Mathematics
Subjects:
Online Access:https://csmj.mosuljournals.com/article_163650_6a25fa5e22437c4132c1c661e8b40ff9.pdf
_version_ 1818527391532711936
author Manar Kashmola
Ameera Sallo
author_facet Manar Kashmola
Ameera Sallo
author_sort Manar Kashmola
collection DOAJ
description The covert channels of type covert storage channels were used in this research to hide textual data or an (image hiding secrete data) in the transmission protocol layer and the internet protocol layer of TCP/IP module. We use IP protocol in designing covert channel by using Identification field, and use TCP protocol in designing covert channel by using Urgent Pointer  field, and UDP by using Source Port field. Finally ICMP protocol by using Echo request message and Message field.  The result of Covert channel after analyzing the protocols (IP, TCP, UDP, ICMP) header depends on the field that used in the designing the Covert channel. The access ratio of hidden data in the two protocols TCP/IP was %100. UDP protocol on the other hand depends on a mechanism of unsafe communication. ICMP protocol provided a good transmission, though unreliable, in that the message structure can be unreliable or clear.
first_indexed 2024-12-11T06:35:29Z
format Article
id doaj.art-08a451be982b4624b8dc85209ab5bebf
institution Directory Open Access Journal
issn 1815-4816
2311-7990
language Arabic
last_indexed 2024-12-11T06:35:29Z
publishDate 2011-12-01
publisher Mosul University
record_format Article
series Al-Rafidain Journal of Computer Sciences and Mathematics
spelling doaj.art-08a451be982b4624b8dc85209ab5bebf2022-12-22T01:17:23ZaraMosul UniversityAl-Rafidain Journal of Computer Sciences and Mathematics1815-48162311-79902011-12-0182355010.33899/csmj.2011.163650163650Information Hiding Techniques Using Network ProtocolsManar Kashmola0Ameera Sallo1College of Computer And Math .SciencesPresidency of Mosul UniversityThe covert channels of type covert storage channels were used in this research to hide textual data or an (image hiding secrete data) in the transmission protocol layer and the internet protocol layer of TCP/IP module. We use IP protocol in designing covert channel by using Identification field, and use TCP protocol in designing covert channel by using Urgent Pointer  field, and UDP by using Source Port field. Finally ICMP protocol by using Echo request message and Message field.  The result of Covert channel after analyzing the protocols (IP, TCP, UDP, ICMP) header depends on the field that used in the designing the Covert channel. The access ratio of hidden data in the two protocols TCP/IP was %100. UDP protocol on the other hand depends on a mechanism of unsafe communication. ICMP protocol provided a good transmission, though unreliable, in that the message structure can be unreliable or clear.https://csmj.mosuljournals.com/article_163650_6a25fa5e22437c4132c1c661e8b40ff9.pdfinformation hidingnetwork protocolscovert channel hiding information in tcpudpicmpigmp
spellingShingle Manar Kashmola
Ameera Sallo
Information Hiding Techniques Using Network Protocols
Al-Rafidain Journal of Computer Sciences and Mathematics
information hiding
network protocols
covert channel hiding information in tcp
udp
icmp
igmp
title Information Hiding Techniques Using Network Protocols
title_full Information Hiding Techniques Using Network Protocols
title_fullStr Information Hiding Techniques Using Network Protocols
title_full_unstemmed Information Hiding Techniques Using Network Protocols
title_short Information Hiding Techniques Using Network Protocols
title_sort information hiding techniques using network protocols
topic information hiding
network protocols
covert channel hiding information in tcp
udp
icmp
igmp
url https://csmj.mosuljournals.com/article_163650_6a25fa5e22437c4132c1c661e8b40ff9.pdf
work_keys_str_mv AT manarkashmola informationhidingtechniquesusingnetworkprotocols
AT ameerasallo informationhidingtechniquesusingnetworkprotocols