TY - CHAP
T1 - Crafting web counters into covert channels
AU - Luo, Xiapu
AU - Chan, Edmond W.W.
AU - Chang, Kow Chuen
PY - 2007/11/26
Y1 - 2007/11/26
N2 - Almost all the previously proposed network storage channels write covert messages in the packets' protocol fields. In contrast, we present in this paper a new network storage channel WebShare that uses the plentiful, public Web counters for storage. Therefore, the physical locations of the WebShare encoder and decoder are not restricted to a single path. To make WebShare practical, we have addressed a number of thorny issues, such as the "noise" introduced by other legitimate Web requests, and synchronization between encoder and decoder. For the proof-of-concept purpose, we have experimented a WebShare prototype in the Internet, and have showed that it is practically feasible even when the Web counter and the encoder/decoder are separated by more than 20 router hops.
AB - Almost all the previously proposed network storage channels write covert messages in the packets' protocol fields. In contrast, we present in this paper a new network storage channel WebShare that uses the plentiful, public Web counters for storage. Therefore, the physical locations of the WebShare encoder and decoder are not restricted to a single path. To make WebShare practical, we have addressed a number of thorny issues, such as the "noise" introduced by other legitimate Web requests, and synchronization between encoder and decoder. For the proof-of-concept purpose, we have experimented a WebShare prototype in the Internet, and have showed that it is practically feasible even when the Web counter and the encoder/decoder are separated by more than 20 router hops.
UR - http://www.scopus.com/inward/record.url?scp=36248984776&partnerID=8YFLogxK
U2 - 10.1007/978-0-387-72367-9_29
DO - 10.1007/978-0-387-72367-9_29
M3 - Chapter in an edited book (as author)
SN - 0387723668
SN - 9780387723662
T3 - IFIP International Federation for Information Processing
SP - 337
EP - 348
BT - New Approaches for Security, Privacy and Trust in Complex Environments
ER -