Information Hiding Techniques Using Network Protocols
The covert channels of type covert storage channels were used in this research to hide textual data or an (image hiding secrete data) in the transmission protocol layer and the internet protocol layer of TCP/IP module. We use IP protocol in designing covert channel by using Identification field, and...
Main Authors: | , |
---|---|
Format: | Article |
Language: | Arabic |
Published: |
Mosul University
2011-12-01
|
Series: | Al-Rafidain Journal of Computer Sciences and Mathematics |
Subjects: | |
Online Access: | https://csmj.mosuljournals.com/article_163650_6a25fa5e22437c4132c1c661e8b40ff9.pdf |
_version_ | 1818527391532711936 |
---|---|
author | Manar Kashmola Ameera Sallo |
author_facet | Manar Kashmola Ameera Sallo |
author_sort | Manar Kashmola |
collection | DOAJ |
description | The covert channels of type covert storage channels were used in this research to hide textual data or an (image hiding secrete data) in the transmission protocol layer and the internet protocol layer of TCP/IP module. We use IP protocol in designing covert channel by using Identification field, and use TCP protocol in designing covert channel by using Urgent Pointer field, and UDP by using Source Port field. Finally ICMP protocol by using Echo request message and Message field.
The result of Covert channel after analyzing the protocols (IP, TCP, UDP, ICMP) header depends on the field that used in the designing the Covert channel. The access ratio of hidden data in the two protocols TCP/IP was %100. UDP protocol on the other hand depends on a mechanism of unsafe communication. ICMP protocol provided a good transmission, though unreliable, in that the message structure can be unreliable or clear. |
first_indexed | 2024-12-11T06:35:29Z |
format | Article |
id | doaj.art-08a451be982b4624b8dc85209ab5bebf |
institution | Directory Open Access Journal |
issn | 1815-4816 2311-7990 |
language | Arabic |
last_indexed | 2024-12-11T06:35:29Z |
publishDate | 2011-12-01 |
publisher | Mosul University |
record_format | Article |
series | Al-Rafidain Journal of Computer Sciences and Mathematics |
spelling | doaj.art-08a451be982b4624b8dc85209ab5bebf2022-12-22T01:17:23ZaraMosul UniversityAl-Rafidain Journal of Computer Sciences and Mathematics1815-48162311-79902011-12-0182355010.33899/csmj.2011.163650163650Information Hiding Techniques Using Network ProtocolsManar Kashmola0Ameera Sallo1College of Computer And Math .SciencesPresidency of Mosul UniversityThe covert channels of type covert storage channels were used in this research to hide textual data or an (image hiding secrete data) in the transmission protocol layer and the internet protocol layer of TCP/IP module. We use IP protocol in designing covert channel by using Identification field, and use TCP protocol in designing covert channel by using Urgent Pointer field, and UDP by using Source Port field. Finally ICMP protocol by using Echo request message and Message field. The result of Covert channel after analyzing the protocols (IP, TCP, UDP, ICMP) header depends on the field that used in the designing the Covert channel. The access ratio of hidden data in the two protocols TCP/IP was %100. UDP protocol on the other hand depends on a mechanism of unsafe communication. ICMP protocol provided a good transmission, though unreliable, in that the message structure can be unreliable or clear.https://csmj.mosuljournals.com/article_163650_6a25fa5e22437c4132c1c661e8b40ff9.pdfinformation hidingnetwork protocolscovert channel hiding information in tcpudpicmpigmp |
spellingShingle | Manar Kashmola Ameera Sallo Information Hiding Techniques Using Network Protocols Al-Rafidain Journal of Computer Sciences and Mathematics information hiding network protocols covert channel hiding information in tcp udp icmp igmp |
title | Information Hiding Techniques Using Network Protocols |
title_full | Information Hiding Techniques Using Network Protocols |
title_fullStr | Information Hiding Techniques Using Network Protocols |
title_full_unstemmed | Information Hiding Techniques Using Network Protocols |
title_short | Information Hiding Techniques Using Network Protocols |
title_sort | information hiding techniques using network protocols |
topic | information hiding network protocols covert channel hiding information in tcp udp icmp igmp |
url | https://csmj.mosuljournals.com/article_163650_6a25fa5e22437c4132c1c661e8b40ff9.pdf |
work_keys_str_mv | AT manarkashmola informationhidingtechniquesusingnetworkprotocols AT ameerasallo informationhidingtechniquesusingnetworkprotocols |