Hiding out in plaintext: covert messaging with bitwise summations

dc.contributor.author Perkins, Michael
dc.contributor.department Department of Electrical and Computer Engineering
dc.date 2020-06-17T02:42:00.000
dc.date.accessioned 2020-06-30T08:13:59Z
dc.date.available 2020-06-30T08:13:59Z
dc.date.copyright Sat Jan 01 00:00:00 UTC 2005
dc.date.issued 2005-01-01
dc.description.abstract <p>Network-based information hiding is possible in even the most adverse conditions such as when an active warden reduces packets into a canonical form and enforces protocol specification. Covert channels in the TCP/IP protocol suite are surveyed from the network layer up to the application layer which is given special emphasis. Active wardens are discussed in detail, as those network devices attempt to thwart covert communications. Application layer hiding techniques are gaining popularity and can be viewed as a response to active wardens. However, even the best application layer techniques tend to be confined to a particular protocol. We define the theoretical foundations for a new scheme in which bitwise summations of application layer messages convey covert bits. A set of large HTTP queries is taken from Internet Traffic Archive for analysis. Two bitwise summation methods, an ad-hoc and a blind (cryptographic), are compared using the Web repository. The viability of both methods is established, though the cryptographic findings are more conclusive. Following the test results, a client/server model is outlined that utilizes either the ad-hoc or the blind method for covert communication. Development of a functioning prototype based on that model is described as well. The client, called tcphalm for hide application layer messages, can communicate without the requirement of superuser privileges by gathering socket messages through system call interposition. The server, tcphalmd, only supports the HTTP protocol but is demonstrative enough so that other application protocols can easily be incorporated into the code. Finally, future work is discussed which includes steps concerned network administrators can take to combat application layer hiding techniques. However, because hiding techniques can be adapted to handle such countermeasures, the covert messaging arms race will likely continue well into the future. For now, information hiding methods that employ bitwise summations enjoy a sizeable advantage over active wardens.</p>
dc.format.mimetype application/pdf
dc.identifier archive/lib.dr.iastate.edu/rtd/19214/
dc.identifier.articleid 20213
dc.identifier.contextkey 18125302
dc.identifier.doi https://doi.org/10.31274/rtd-20200616-107
dc.identifier.s3bucket isulib-bepress-aws-west
dc.identifier.submissionpath rtd/19214
dc.identifier.uri https://dr.lib.iastate.edu/handle/20.500.12876/73200
dc.language.iso en
dc.source.bitstream archive/lib.dr.iastate.edu/rtd/19214/Perkins_ISU_2005_P376.pdf|||Fri Jan 14 21:53:41 UTC 2022
dc.subject.keywords Electrical and computer engineering
dc.subject.keywords Information assurance
dc.title Hiding out in plaintext: covert messaging with bitwise summations
dc.type thesis
dc.type.genre thesis
dspace.entity.type Publication
relation.isOrgUnitOfPublication a75a044c-d11e-44cd-af4f-dab1d83339ff
thesis.degree.discipline Information Assurance
thesis.degree.level thesis
thesis.degree.name Master of Science
File
Original bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
Perkins_ISU_2005_P376.pdf
Size:
1.24 MB
Format:
Adobe Portable Document Format
Description: