Covert channels in the TCP/IP protocol suite
Abstract
The TCP/IP protocol suite has a number of weaknesses that allow an attacker to leverage techniques in the form of covert channels to surreptitiously pass data in otherwise benign packets. This paper attempts to illustrate these weaknesses in both theoretical and practical examples.
Keywords
encoding information in a TCP/IP header; manipulation of the IP identification field; initial sequence number field; TCP acknowledge sequence number field bounce; protection; detection; covert_tcp program; article
Full Text:
HTMLDOI: http://dx.doi.org/10.5210%2Ffm.v2i5.528
A Great Cities Initiative of the University of Illinois at Chicago University Library.
© First Monday, 1995-2013.


