SlideShare una empresa de Scribd logo
1 de 5
Descargar para leer sin conexión
Hamza Kheddar Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 5, Issue 3, ( Part -3) March 2015, pp. 44-48
www.ijera.com 44 | P a g e
Implementation of Steganographic Method Based on IPv4
Identification Field over NS-3
Hamza Kheddar*, Merouane Bouzid**
*(Department of Telecommunication, LCPTS Lab USTHB University, Algeria)
** (Department of Telecommunication, LCPTS Lab USTHB University, Algeria)
ABSTRACT
In this paper we present first a study of covert channels (steganography) that may be applied for each TCP/IP
layer in VoIP application. Then, we present a steganographic method which hide secret data in IP protocol
header fields, particularly the identification field. The IP protocol covert channel implementation was carried out
in NS-3 (Network Simulator 3).
Keywords - Data hiding, network steganography, Secure VoIP, TCP/IP protocols, Covert Channel.
I. INTRODUCTION
The covert channel concept was introduced in
1973 [1]. A covert channel is a communication
channel that allows two cooperating processes to
transfer information in a manner that it does not
respect the system's security policy [2]. It means a
communication that is not part of the original system
which can be used to transfer information to a
process or user in a hidden manner.
Covert channels exist only in systems with
multilevel security [3], which contain and manage
information with different sensitivity levels. It
allows different users access to the information, at
the same time, with different itineraries.
VoIP is one of the most popular services in IP
networks and it stormed into the telecom market and
changed it entirely. As it is used worldwide more
and more willingly, the traffic volume that it
generates is still increasing. That is why VoIP is
suitable to enable hidden communication throughout
IP networks.
VoIP covert channels have different
applications as they can pose a threat to the network
communication or may be used to improve the
functioning of VoIP (e.g. security as in [4] or quality
of service [5]). The first application of the covert
channel is more dangerous as it may lead to the
confidential information leakage. It is hard to assess
what bandwidth of covert channel poses a serious
threat. It depends on the security policy that is
implemented in the network. For example, US
Department of Defense specifies in [6] that any
covert channel with bandwidth higher than 100 bps
must be considered insecure for average security
requirements. Moreover for high security
requirements it should not exceed 1 bps.
In this paper we present a study of covert
channels that may be applied for the layered TCP/IP
model in a VoIP communication. We will focus in
particularly, on the implementation of a
steganographic method based on hiding data in
identification field which located on the IP header
(fig.1).
Fig.1 IPv4 Header.
II. TCP/IP MODEL
TCP/IP is a set of network protocols developed
for Internet from the 1970s. As a protocol suite
based on layers, TCP/IP has a number of weaknesses
that allow an attacker to leverage techniques in the
form of covert channels to secretly pass data in
ordinary packets [7].
The appropriateness of protocol layers for
covert channels is evaluated with respect to three
criteria: technical difficulty, generality and
reachability.
 Technical Difficulty: What are the technical
requirements and barriers to establish and read a
covert channel? Does it require: special
hardware, alteration of the operating system, low
level programming, developing an application or
simple system configuration?
 Generality: Once the technical barriers for a
covert channel have been overcome, how widely
can they be applied? Is all Internet traffic
susceptible or only some subset thereof?
RESEARCH ARTICLE OPEN ACCESS
Hamza Kheddar Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 5, Issue 3, ( Part -3) March 2015, pp. 44-48
www.ijera.com 45 | P a g e
 Reachability: If a covert channel is established,
how far can it reach through the Internet? For
example, is it likely to be confined within an
institution (LAN) or be on a global scale (WAN).
In this section, a high level description of each layer
of the TCP/IP protocol stack is presented. The
characteristics and potential for covert channels of
each layer is briefly discussed [8], [9]. In the
protocol stack each layer is implemented by one or
more protocols (horizontal) and one or more
interfaces (vertical), as outlined in Fig. 2.
A. Physical layer
The physical layer contains all the functions
needed to carry the bit stream over a physical
medium to connect adjacent nodes. The protocols in
this layer depend on the actual transmission medium
used. There are a number of barriers that make this
layer a difficult environment for establishing,
encoding and decoding the covert channel. This
would probably require special hardware to be
designed and installed. In addition, the diversity of
protocols and media mean that different technologies
would have to be developed for each type of
network which yields to limit the generality.
Furthermore, the reachability of the covert channel
would be often limited to adjacent nodes (within an
institution or some subset thereof) with some limited
extension possible where repeaters are in use.
B. Link layer
The link layer is responsible for organizing the
bit stream into a data unit called a frame and
delivery the frames between adjacent nodes on a
network. It provides physical addressing (port
number), and error detection (such as cyclical
redundancy check). The link layer also includes the
Media Access Control (MAC) sub-layer, which
provides physical addressing and channel access
control mechanisms that enable several terminals or
network nodes to communicate in a network.
There are a number of technical difficulties that
would need to be overcome to establish covert
channels at this level. Special hardware or low level
device driver programming is necessary, because
different types of network such as Ethernet, ATM
and Token-Ring have different link layer protocols.
The reachability of covert channels at this layer will
often be limited to a LAN (within an institution) as
long as there are logical and physical limits, with
some limited extension possible where level-3
network router are in use.
Two potential ways in which the link layer may
be used for covert channels are given on [8], [9].
Firstly, the collision detection system (Carrier Sense
Multiple Access / Collision Detection CSMA/CD) in
the Ethernet link layer can be modified to transmit
hidden data by adjusting the collision control
mechanism. Secondly, unused portions of the frame
can be used to store covert data. Covert data can be
stored in the buffer, beginning at the end toward the
valid data. When the packet is transmitted, the entire
buffer is exported, including the covert data.
C. Network layer
The network layer delivers data in the form of a
packet from source to destination, across as many
links as necessary. At the Network layer, the packets
of the communication need to be identified with the
source and destination addresses of the two end
nodes. With IPv4, this means that each packet has a
32-bit source address and a 32-bit destination
address in the IP protocol header. The IP protocol
defines the addressing system and how intermediary
nodes should treat packets. Each packet can be
independently routed from source to destination. It
provides a best effort service to higher layers. The
network layer also contains control and routing
protocols.
Covert channels can be created at the network
layer; however this is requiring device driver
programming or alteration of operating system code.
Developing a single technology to establish covert
channels in the network layer, would yield a high
degree of generality and global reachability.
Analysis of the IP header shows the existence of
bits that are either unused or optional. Consequently,
fields from the IP header can be manipulated to store
covert data. An extended analysis of using the IP
identification field as a covert channel is presented
later in this paper.
D. Transport layer
Process-to-process delivery is the task of the
transport layer. Getting a packet to the destination
system is not quite the same thing as determining
which process should receive the packet’s content. A
system can be running file transfer, email, and other
network processes all at the same time, and all over
Application Application
Transport Transport
Network Network protocol
Data link Data link
interface
Physical Physical
Hamza Kheddar Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 5, Issue 3, ( Part -3) March 2015, pp. 44-48
www.ijera.com 46 | P a g e
a single physical interface. Naturally, the destination
process has to know on which process the sender
originated the bits inside the packet in order to reply.
There are two main Internet transport protocols: the
Universal Datagram Protocol (UDP) and the
Transmission Control Protocol (TCP). TCP is a
connection-oriented, “reliable” service that provides
ordered delivery of packet contents. UDP is a
connectionless, “unreliable” service that does not
provide ordered delivery of packet contents [10].
The location of transport protocol
implementations within the operating system, make
the technical difficulties in creating covert channels
similar to the Internet layer. The creation of adapted
device drivers or the modification of operating
system source code is likely to be necessary. It is
variously estimated that over 80% all Internet traffic
[11] is carried by TCP therefore establishing a covert
channel within TCP provides a high level of
generality. The fact that TCP is an end-to-end
protocol gives it global reachability. In addition, the
TCP header is more complex than IP and has a
significant array of options, which means there is
more potential for the creation of such channels.
Two examples of using TCP fields to covert
channels [12], [13] are given below:
1) Initial Sequence Number Field: The Initial
Sequence Number (ISN) field of the TCP/IP
protocol suite enables a client to establish a
reliable protocol negotiation with a remote
server. As part of the negotiation process for
TCP/IP, several steps are taken in what is
commonly called a "three way handshake”. For
our purposes, the sequence number field serves
as a good medium for transmitting clandestine
data because of its size (a 32 bit number). Hence,
there are a number of possible hiding methods to
use. The simplest is to generate the sequence
number from our actual ASCII character we wish
to have encoded.
2) The TCP Acknowledge Sequence Number Field:
This method, called "Bounce", relies upon basic
spoofing of IP addresses to enable a sending host
to "bounce" a packet of information outside of a
remote site and have that site return the packet to
the real destination address. This has the benefit
of concealing the packet sender as it appears to
come from the "bounce" host. This method could
be used to set up an anonymous one-way
communication network that would be difficult
to detect especially if the bounce server is very
busy. This method relies on the characteristic of
TCP/IP where the destination server responds to
an initial connect request (SYN packet) with a
SYN/ACK packet containing the original initial
sequence number plus one (ISN+1).
E. Application layer
This layer handles issues like network
transparency, resource allocation and problem
partitioning. The application layer is concerned with
the user’s view of the network, such as formatting e-
mail messages [10]. It contains a diverse range of
protocols for applications such as email, remote
administration, World Wide Web (WWW) and Peer-
to-Peer content distribution. An important
application is DNS (Domain Name System) which
translates host names into IP addresses.
The technical difficulties in creating covert
channels are easiest to overcome at the application
layer where limited or no programming skills may
be required. The diversity of protocols make the
generality of a technical solution limited, however
most networked computers can be expected to
support common protocols such HTTP and SNMP.
So, reachability will be global.
The application layer is nearest the user who can
create applications utilising system resources
including the network. Many of the classical
steganographic approaches can be used at the
application level. For example, a covert messaging
system can be devised using word substitution in an
email system.
For all these types of steganographic (TCP/IP
protocols Steganography) methods mentioned on
this paper, achieved steganographic bandwidth can
be expressed as follows [14]:
𝑃𝑅𝐵𝑅 𝑁𝑆 =
𝑆𝐵0 + 𝑆𝐵𝑗
𝑙
𝑗=1
𝑙 + 1
𝑏𝑖𝑡𝑠/𝑝𝑎𝑐𝑘𝑒𝑡 (1)
Where:
- 𝑃𝑅𝐵𝑅 𝑁𝑆 (Packet Raw Bit Rate) denotes
bandwidth of the covert channel created by
TCP/IP steganography [bits/packet].
- 𝑆𝐵0 is the total amount of bits for TCP/IP
protocols that can be covertly send in the fields of
the first packet.
- 𝑆𝐵𝑗 denotes total amount of bits for TCP/IP
protocols that can be covertly sent in the fields of
the following packets, 𝑙 is number of packets send
besides first packet.
III. IMPLEMENTATION OF COVERT
CHANNEL BASED ON IP
IDENTIFICATION FIELD
In this section, we present a network
steganographic method based on hiding data in
identification field which located on the IP header.
Our implementation of a VoIP network system was
carried out by using the Network Simulator NS-3
[15] to obtain realistic scenario of IP packet
transmission.
Fig.3 shows the point-to-point topology used in
the simulation. It is a common configuration where
traffic is generated from one node of a network and
forwarded to other node. This output link is
Hamza Kheddar Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 5, Issue 3, ( Part -3) March 2015, pp. 44-48
www.ijera.com 47 | P a g e
represented by an Ethernet link between the first
Ethernet network node and the other side node. Our
steganographic method has been implemented on IP
header situated exactly on the layer three of IP
protocol. It means that we have extended the IP
protocol with an algorithm to enable covert channel
on identification field.
Notice that our simulation was carried out with
traffic sources Constant Bit Rate (CBR) of 5 Mbits
and 2 ms for the delay. In our simulation of the
covert channel based on IP header identification
field, we have transmitted the data word “hello” as a
secret message, the actual packet data does not
matter. We have tested it in text format which is the
easiest way for result exhibition and we can decode
it from ASCII format to text format manually. The
implementation of this method gives the result
shown fig.4.
Node 0 Node 1
TCP TCP
IP 10.1.1.1 IP 10.1.1.2
Point-to-point Point-to-point
Fig. 3 Topology used in the simulation.
Fig. 4 shows an example of trace file for the
captured packet transmitted during the
communication between the two nodes. The file can
be generated either with .tr format which can be
read by a simple software like Notepad (software
exist on windows), or with .pcap format which can
be read by Wireshark software [16].As we can see
clearly in this figure, the first identification field (id)
of the first packet equal 0, the second id equal 104
which is the ASCII code of the letter h, the third id
equal 101 which is the ASCII code of the letter e, the
fourth id equal 108 which is the ASCII code of the
letter l, the fifth id equal 108 which is the ASCII
code of the letter l and so on.
Notice that the first identification field (id) of
the first packet equal 0 (fig.4), this value ( 𝑆𝐵0 in
Eq.1) differs from the values achieved for the
following packets ( 𝑆𝐵𝑗
𝑙
𝑗 =1 in Eq. 1) because in the
first packet initial values of certain fields can be
used (e.g. sequence number for TCP protocol) [14].
In our simulation, we have sent 20 packets,
while our secret message “hello” needs 6 packets to
be completely transferred (1 packet for each
character plus 1 for the first packet), so it remain 14
packets, hence our covert channel will be created for
the 6 packets then, our implementation assigns the
default value of identification field which NS-3
generate it without covert channel (default
configuration) for each remaining packet.
It is also worth noting that we can represent a
32-bit IPv4 address as a 128-bit IPv6 address by
implementing or activating an existing transition
mechanism such as dual stack, IPv4 compatible
address formats or Tunneling mechanisms[17], thus
our method of steganography can pass through an
IPv6 network. Consequently the reachability will be
much more global than before.
IV. CONCLUSION
In this paper, we presented first an analysis of the
potential for covert channels in each layer of the
TCP/IP protocol stack. The analysis revealed that the
network and transport layers, which they have
consecutively the IP and the TCP protocols, are the
most vulnerable to the creation of covert channels.
The implementation confirms that the
identification field in the IPv4 can be used to store a
specific value to be passed to the other end, so it is
possible to use this method to pass data between
hosts in any IP packet.
Fig. 4 Trace file of the end-to-end communication scenario.
5Mbit, 2ms
Hamza Kheddar Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 5, Issue 3, ( Part -3) March 2015, pp. 44-48
www.ijera.com 48 | P a g e
Our future work aim is to develop a mechanism
to make relationship between the network
Steganography (covert channels) based on protocols
and the data hiding applied on speech coder. In other
word, developing a method to control the covert
channels based on protocols via payload coded data
and vise versa.
REFERENCES
[1] B. W Lampson. A Note on the
Confinement Problem. USA, Xerox Palo
Alto Research Center, 1973.
[2] S. Berg, Glossary of Computer Security
Terms. USA, National Computer Security
Center, 1998.
[3] N. E. Proctor, P. G. Neumann,
Architectural implications of Covert
Channels. USA, Computer Science Lab, SRI
International, 1992.
[4] W. Mazurczyk, Z .Kotulski, New Security
and Control Protocol for VoIP Based on
Steganography and Digital Watermarking.
In Proc. of: IBIZA 2006, Kazimierz Dolny,
Poland, 2006.
[5] W. Mazurczyk, Z. Kotulski, New VoIP
Traffic Security Scheme with Digital
Watermarking. In: J. Górski, SAFECOMP
2006. LNCS, vol. 4166, pp. 170–181.
Springer, Heidelberg, 2006.
[6] US Department of Defense, Department of
Defense Trusted Computer System
Evaluation Criteria, DOD 5200.28-STD
(The Orange Book1985).
[7] D. Llamas, Covert channel analysis and
data hiding in the TCP/IP protocol suite.
Honours Project Thesis. UK, Napier
University, 2004.
[8] C. G. Girling, Covert Channels in LAN`s.
USA, IEEE Transactions on Software
Engineering, 1987.
[9] T. G. Handeland, M. T. Sandford. Hiding
Data in the OSI Network Model. USA,
Weapon Design Technology Group, Los
Alamos National Laboratory, 1996.
[10] D. Howe, “FOLDOC Computer
Dictionary”. USA, Webnox Corp 2003.
[11] S. Lam, Back to the Future Part 4: The
Internet. USA, ACM SIGCOMM Computer
Communication Review, 2005.
[12] Route Project Loki: ICMP Tunnelling.
USA, Phrack Magazine 1996.
[13] Rowland, C. H. USA,Vol.2 No.5- First
Monday Magazine, 1996.
[14] W. Mazurczyk and K. Szczypiorski
Steganography of VoIP Streams. OTM
2008, Part II, LNCS 5332, pp. 1001–1018,
Springer- Heidelberg 2008.
[15] (2014) The ns-3 website. [Online].
Available: www.nsnam.org/
[16] (2014) The wireshark
website.[Online].Available:
https://www.wireshark.org/.
[17] Sun Microsystems (2014) System
Administration Guide Volume 3, chapter
15”Transition from IPv4 to IPv6”
homepage. [Online]. Available:
www.docs.oracle.com/cd/E19455-01/806
0916/index.html.

Más contenido relacionado

La actualidad más candente

ETE405-lec7.pdf
ETE405-lec7.pdfETE405-lec7.pdf
ETE405-lec7.pdfmashiur
 
The Network Protocol Stack Revisited
The Network Protocol Stack RevisitedThe Network Protocol Stack Revisited
The Network Protocol Stack Revisitedinbroker
 
A Rouge Relay Node Attack Detection and Prevention in 4G Multihop Wireless N...
A Rouge Relay Node Attack Detection and Prevention  in 4G Multihop Wireless N...A Rouge Relay Node Attack Detection and Prevention  in 4G Multihop Wireless N...
A Rouge Relay Node Attack Detection and Prevention in 4G Multihop Wireless N...IRJET Journal
 
ETE405-lec7.ppt
ETE405-lec7.pptETE405-lec7.ppt
ETE405-lec7.pptmashiur
 
Unit 3 Network Layer PPT
Unit 3 Network Layer PPTUnit 3 Network Layer PPT
Unit 3 Network Layer PPTKalpanaC14
 
ETE405-lec7.pptx
ETE405-lec7.pptxETE405-lec7.pptx
ETE405-lec7.pptxmashiur
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
Ijarcet vol-2-issue-3-933-937
Ijarcet vol-2-issue-3-933-937Ijarcet vol-2-issue-3-933-937
Ijarcet vol-2-issue-3-933-937Editor IJARCET
 
A Comparative Analysis of Additional Overhead Imposed by Internet Protocol Se...
A Comparative Analysis of Additional Overhead Imposed by Internet Protocol Se...A Comparative Analysis of Additional Overhead Imposed by Internet Protocol Se...
A Comparative Analysis of Additional Overhead Imposed by Internet Protocol Se...ijceronline
 
Internet Engineering Task Force
Internet Engineering Task ForceInternet Engineering Task Force
Internet Engineering Task ForceYatish Bathla
 
communication system l2
communication system l2communication system l2
communication system l2MR Z
 
MC0087 Internal Assignment (SMU)
MC0087 Internal Assignment (SMU)MC0087 Internal Assignment (SMU)
MC0087 Internal Assignment (SMU)Krishan Pareek
 
AN EXPERIMENTAL STUDY OF IOT NETWORKS UNDER INTERNAL ROUTING ATTACK
AN EXPERIMENTAL STUDY OF IOT NETWORKS UNDER INTERNAL ROUTING ATTACKAN EXPERIMENTAL STUDY OF IOT NETWORKS UNDER INTERNAL ROUTING ATTACK
AN EXPERIMENTAL STUDY OF IOT NETWORKS UNDER INTERNAL ROUTING ATTACKIJCNCJournal
 
A Survey on DPI Techniques for Regular Expression Detection in Network Intrus...
A Survey on DPI Techniques for Regular Expression Detection in Network Intrus...A Survey on DPI Techniques for Regular Expression Detection in Network Intrus...
A Survey on DPI Techniques for Regular Expression Detection in Network Intrus...ijsrd.com
 
TRENDS TOWARD REAL-TIME NETWORK DATA STEGANOGRAPHY
TRENDS TOWARD REAL-TIME NETWORK DATA STEGANOGRAPHY TRENDS TOWARD REAL-TIME NETWORK DATA STEGANOGRAPHY
TRENDS TOWARD REAL-TIME NETWORK DATA STEGANOGRAPHY IJNSA Journal
 

La actualidad más candente (18)

ETE405-lec7.pdf
ETE405-lec7.pdfETE405-lec7.pdf
ETE405-lec7.pdf
 
The Network Protocol Stack Revisited
The Network Protocol Stack RevisitedThe Network Protocol Stack Revisited
The Network Protocol Stack Revisited
 
A Rouge Relay Node Attack Detection and Prevention in 4G Multihop Wireless N...
A Rouge Relay Node Attack Detection and Prevention  in 4G Multihop Wireless N...A Rouge Relay Node Attack Detection and Prevention  in 4G Multihop Wireless N...
A Rouge Relay Node Attack Detection and Prevention in 4G Multihop Wireless N...
 
Module 3 INTERNET OF THINGS
Module 3 INTERNET OF THINGSModule 3 INTERNET OF THINGS
Module 3 INTERNET OF THINGS
 
ETE405-lec7.ppt
ETE405-lec7.pptETE405-lec7.ppt
ETE405-lec7.ppt
 
Unit 3 Network Layer PPT
Unit 3 Network Layer PPTUnit 3 Network Layer PPT
Unit 3 Network Layer PPT
 
ETE405-lec7.pptx
ETE405-lec7.pptxETE405-lec7.pptx
ETE405-lec7.pptx
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
Ijarcet vol-2-issue-3-933-937
Ijarcet vol-2-issue-3-933-937Ijarcet vol-2-issue-3-933-937
Ijarcet vol-2-issue-3-933-937
 
A Comparative Analysis of Additional Overhead Imposed by Internet Protocol Se...
A Comparative Analysis of Additional Overhead Imposed by Internet Protocol Se...A Comparative Analysis of Additional Overhead Imposed by Internet Protocol Se...
A Comparative Analysis of Additional Overhead Imposed by Internet Protocol Se...
 
Internet Engineering Task Force
Internet Engineering Task ForceInternet Engineering Task Force
Internet Engineering Task Force
 
communication system l2
communication system l2communication system l2
communication system l2
 
Unit 1 qb
Unit 1 qbUnit 1 qb
Unit 1 qb
 
MC0087 Internal Assignment (SMU)
MC0087 Internal Assignment (SMU)MC0087 Internal Assignment (SMU)
MC0087 Internal Assignment (SMU)
 
AN EXPERIMENTAL STUDY OF IOT NETWORKS UNDER INTERNAL ROUTING ATTACK
AN EXPERIMENTAL STUDY OF IOT NETWORKS UNDER INTERNAL ROUTING ATTACKAN EXPERIMENTAL STUDY OF IOT NETWORKS UNDER INTERNAL ROUTING ATTACK
AN EXPERIMENTAL STUDY OF IOT NETWORKS UNDER INTERNAL ROUTING ATTACK
 
A Survey on DPI Techniques for Regular Expression Detection in Network Intrus...
A Survey on DPI Techniques for Regular Expression Detection in Network Intrus...A Survey on DPI Techniques for Regular Expression Detection in Network Intrus...
A Survey on DPI Techniques for Regular Expression Detection in Network Intrus...
 
TRENDS TOWARD REAL-TIME NETWORK DATA STEGANOGRAPHY
TRENDS TOWARD REAL-TIME NETWORK DATA STEGANOGRAPHY TRENDS TOWARD REAL-TIME NETWORK DATA STEGANOGRAPHY
TRENDS TOWARD REAL-TIME NETWORK DATA STEGANOGRAPHY
 
N0363079085
N0363079085N0363079085
N0363079085
 

Destacado

Franklin university acct 360 assignment help
Franklin university acct 360 assignment helpFranklin university acct 360 assignment help
Franklin university acct 360 assignment helpleesa marteen
 
Scan diploma VIS dipl.ing.chem. techn.
Scan diploma VIS dipl.ing.chem. techn.Scan diploma VIS dipl.ing.chem. techn.
Scan diploma VIS dipl.ing.chem. techn.X Y
 
Eric.R.George -Official Resume UNB
Eric.R.George -Official Resume UNBEric.R.George -Official Resume UNB
Eric.R.George -Official Resume UNBRakeem George
 
Arckönyvről az arcoknak -
Arckönyvről az arcoknak - Arckönyvről az arcoknak -
Arckönyvről az arcoknak - Kukár Leó
 
Eugenides foundation, planitarium
Eugenides foundation, planitariumEugenides foundation, planitarium
Eugenides foundation, planitariumStergios Kokkoris
 

Destacado (10)

Franklin university acct 360 assignment help
Franklin university acct 360 assignment helpFranklin university acct 360 assignment help
Franklin university acct 360 assignment help
 
Pafilia Gardens Award
Pafilia Gardens AwardPafilia Gardens Award
Pafilia Gardens Award
 
Scan diploma VIS dipl.ing.chem. techn.
Scan diploma VIS dipl.ing.chem. techn.Scan diploma VIS dipl.ing.chem. techn.
Scan diploma VIS dipl.ing.chem. techn.
 
Eric.R.George -Official Resume UNB
Eric.R.George -Official Resume UNBEric.R.George -Official Resume UNB
Eric.R.George -Official Resume UNB
 
Arckönyvről az arcoknak -
Arckönyvről az arcoknak - Arckönyvről az arcoknak -
Arckönyvről az arcoknak -
 
Eugenides foundation, planitarium
Eugenides foundation, planitariumEugenides foundation, planitarium
Eugenides foundation, planitarium
 
NCOER 1
NCOER 1NCOER 1
NCOER 1
 
final file
final filefinal file
final file
 
IABS
IABSIABS
IABS
 
Cook_s_Entirety2
Cook_s_Entirety2Cook_s_Entirety2
Cook_s_Entirety2
 

Similar a Implementation of Steganographic Method Based on IPv4 Identification Field

Cybersecurity Tutorial | Demo On Man In The Middle Attack | Cybersecurity Tra...
Cybersecurity Tutorial | Demo On Man In The Middle Attack | Cybersecurity Tra...Cybersecurity Tutorial | Demo On Man In The Middle Attack | Cybersecurity Tra...
Cybersecurity Tutorial | Demo On Man In The Middle Attack | Cybersecurity Tra...Edureka!
 
Analysis of network traffic by using packet sniffing tool wireshark
Analysis of network traffic by using packet sniffing tool wiresharkAnalysis of network traffic by using packet sniffing tool wireshark
Analysis of network traffic by using packet sniffing tool wiresharkIJARIIT
 
Multi port network ethernet performance improvement techniques
Multi port network ethernet performance improvement techniquesMulti port network ethernet performance improvement techniques
Multi port network ethernet performance improvement techniquesIJARIIT
 
CN-OSI-TCP-Models-001.pdf
CN-OSI-TCP-Models-001.pdfCN-OSI-TCP-Models-001.pdf
CN-OSI-TCP-Models-001.pdfskknowledge
 
Performance Analysis of WiMAX and LTE Using NS-2
Performance Analysis of WiMAX and LTE Using NS-2Performance Analysis of WiMAX and LTE Using NS-2
Performance Analysis of WiMAX and LTE Using NS-2IJERA Editor
 
Bt0072 computer networks 1
Bt0072 computer networks  1Bt0072 computer networks  1
Bt0072 computer networks 1Techglyphs
 
3G Wireless Access, Abstract
3G Wireless Access, Abstract3G Wireless Access, Abstract
3G Wireless Access, AbstractVictoria Burke
 
Security And Privacy Issues Of Iots
Security And Privacy Issues Of IotsSecurity And Privacy Issues Of Iots
Security And Privacy Issues Of IotsSamantha Randall
 
OSI model (7 LAYER )
OSI model (7 LAYER )OSI model (7 LAYER )
OSI model (7 LAYER )AAKASH S
 
Thesis Statement On Digital Security
Thesis Statement On Digital SecurityThesis Statement On Digital Security
Thesis Statement On Digital SecurityLindsey Jones
 
ETE405-lec4.pptx
ETE405-lec4.pptxETE405-lec4.pptx
ETE405-lec4.pptxmashiur
 
pppppppppppppppppjjjjjjjjjjjpppppppp.pptx
pppppppppppppppppjjjjjjjjjjjpppppppp.pptxpppppppppppppppppjjjjjjjjjjjpppppppp.pptx
pppppppppppppppppjjjjjjjjjjjpppppppp.pptxzeyadosama505
 
INTERNWT OF THINGS KHiuahjqilkjhJU HAUI JHJKQB HJAGE IUH OLJQHNORJ BQJ
INTERNWT OF THINGS KHiuahjqilkjhJU HAUI JHJKQB HJAGE IUH OLJQHNORJ BQJINTERNWT OF THINGS KHiuahjqilkjhJU HAUI JHJKQB HJAGE IUH OLJQHNORJ BQJ
INTERNWT OF THINGS KHiuahjqilkjhJU HAUI JHJKQB HJAGE IUH OLJQHNORJ BQJ150ROHITCHANDRASHEKH
 
Analysis Of Internet Protocol ( IP ) Datagrams
Analysis Of Internet Protocol ( IP ) DatagramsAnalysis Of Internet Protocol ( IP ) Datagrams
Analysis Of Internet Protocol ( IP ) DatagramsEmily Jones
 

Similar a Implementation of Steganographic Method Based on IPv4 Identification Field (20)

Cybersecurity Tutorial | Demo On Man In The Middle Attack | Cybersecurity Tra...
Cybersecurity Tutorial | Demo On Man In The Middle Attack | Cybersecurity Tra...Cybersecurity Tutorial | Demo On Man In The Middle Attack | Cybersecurity Tra...
Cybersecurity Tutorial | Demo On Man In The Middle Attack | Cybersecurity Tra...
 
Analysis of network traffic by using packet sniffing tool wireshark
Analysis of network traffic by using packet sniffing tool wiresharkAnalysis of network traffic by using packet sniffing tool wireshark
Analysis of network traffic by using packet sniffing tool wireshark
 
Multi port network ethernet performance improvement techniques
Multi port network ethernet performance improvement techniquesMulti port network ethernet performance improvement techniques
Multi port network ethernet performance improvement techniques
 
Hy3313681373
Hy3313681373Hy3313681373
Hy3313681373
 
Ens
EnsEns
Ens
 
CN-OSI-TCP-Models-001.pdf
CN-OSI-TCP-Models-001.pdfCN-OSI-TCP-Models-001.pdf
CN-OSI-TCP-Models-001.pdf
 
Performance Analysis of WiMAX and LTE Using NS-2
Performance Analysis of WiMAX and LTE Using NS-2Performance Analysis of WiMAX and LTE Using NS-2
Performance Analysis of WiMAX and LTE Using NS-2
 
Ccna report
Ccna reportCcna report
Ccna report
 
Bt0072 computer networks 1
Bt0072 computer networks  1Bt0072 computer networks  1
Bt0072 computer networks 1
 
3G Wireless Access, Abstract
3G Wireless Access, Abstract3G Wireless Access, Abstract
3G Wireless Access, Abstract
 
Security And Privacy Issues Of Iots
Security And Privacy Issues Of IotsSecurity And Privacy Issues Of Iots
Security And Privacy Issues Of Iots
 
OSI model (7 LAYER )
OSI model (7 LAYER )OSI model (7 LAYER )
OSI model (7 LAYER )
 
Thesis Statement On Digital Security
Thesis Statement On Digital SecurityThesis Statement On Digital Security
Thesis Statement On Digital Security
 
Ccna introduction
Ccna introductionCcna introduction
Ccna introduction
 
IOT - Unit 3.pptx
IOT - Unit 3.pptxIOT - Unit 3.pptx
IOT - Unit 3.pptx
 
2010fall ch6 uugantsetseg
2010fall ch6 uugantsetseg2010fall ch6 uugantsetseg
2010fall ch6 uugantsetseg
 
ETE405-lec4.pptx
ETE405-lec4.pptxETE405-lec4.pptx
ETE405-lec4.pptx
 
pppppppppppppppppjjjjjjjjjjjpppppppp.pptx
pppppppppppppppppjjjjjjjjjjjpppppppp.pptxpppppppppppppppppjjjjjjjjjjjpppppppp.pptx
pppppppppppppppppjjjjjjjjjjjpppppppp.pptx
 
INTERNWT OF THINGS KHiuahjqilkjhJU HAUI JHJKQB HJAGE IUH OLJQHNORJ BQJ
INTERNWT OF THINGS KHiuahjqilkjhJU HAUI JHJKQB HJAGE IUH OLJQHNORJ BQJINTERNWT OF THINGS KHiuahjqilkjhJU HAUI JHJKQB HJAGE IUH OLJQHNORJ BQJ
INTERNWT OF THINGS KHiuahjqilkjhJU HAUI JHJKQB HJAGE IUH OLJQHNORJ BQJ
 
Analysis Of Internet Protocol ( IP ) Datagrams
Analysis Of Internet Protocol ( IP ) DatagramsAnalysis Of Internet Protocol ( IP ) Datagrams
Analysis Of Internet Protocol ( IP ) Datagrams
 

Último

Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college projectTonystark477637
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 

Último (20)

Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 

Implementation of Steganographic Method Based on IPv4 Identification Field

  • 1. Hamza Kheddar Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 5, Issue 3, ( Part -3) March 2015, pp. 44-48 www.ijera.com 44 | P a g e Implementation of Steganographic Method Based on IPv4 Identification Field over NS-3 Hamza Kheddar*, Merouane Bouzid** *(Department of Telecommunication, LCPTS Lab USTHB University, Algeria) ** (Department of Telecommunication, LCPTS Lab USTHB University, Algeria) ABSTRACT In this paper we present first a study of covert channels (steganography) that may be applied for each TCP/IP layer in VoIP application. Then, we present a steganographic method which hide secret data in IP protocol header fields, particularly the identification field. The IP protocol covert channel implementation was carried out in NS-3 (Network Simulator 3). Keywords - Data hiding, network steganography, Secure VoIP, TCP/IP protocols, Covert Channel. I. INTRODUCTION The covert channel concept was introduced in 1973 [1]. A covert channel is a communication channel that allows two cooperating processes to transfer information in a manner that it does not respect the system's security policy [2]. It means a communication that is not part of the original system which can be used to transfer information to a process or user in a hidden manner. Covert channels exist only in systems with multilevel security [3], which contain and manage information with different sensitivity levels. It allows different users access to the information, at the same time, with different itineraries. VoIP is one of the most popular services in IP networks and it stormed into the telecom market and changed it entirely. As it is used worldwide more and more willingly, the traffic volume that it generates is still increasing. That is why VoIP is suitable to enable hidden communication throughout IP networks. VoIP covert channels have different applications as they can pose a threat to the network communication or may be used to improve the functioning of VoIP (e.g. security as in [4] or quality of service [5]). The first application of the covert channel is more dangerous as it may lead to the confidential information leakage. It is hard to assess what bandwidth of covert channel poses a serious threat. It depends on the security policy that is implemented in the network. For example, US Department of Defense specifies in [6] that any covert channel with bandwidth higher than 100 bps must be considered insecure for average security requirements. Moreover for high security requirements it should not exceed 1 bps. In this paper we present a study of covert channels that may be applied for the layered TCP/IP model in a VoIP communication. We will focus in particularly, on the implementation of a steganographic method based on hiding data in identification field which located on the IP header (fig.1). Fig.1 IPv4 Header. II. TCP/IP MODEL TCP/IP is a set of network protocols developed for Internet from the 1970s. As a protocol suite based on layers, TCP/IP has a number of weaknesses that allow an attacker to leverage techniques in the form of covert channels to secretly pass data in ordinary packets [7]. The appropriateness of protocol layers for covert channels is evaluated with respect to three criteria: technical difficulty, generality and reachability.  Technical Difficulty: What are the technical requirements and barriers to establish and read a covert channel? Does it require: special hardware, alteration of the operating system, low level programming, developing an application or simple system configuration?  Generality: Once the technical barriers for a covert channel have been overcome, how widely can they be applied? Is all Internet traffic susceptible or only some subset thereof? RESEARCH ARTICLE OPEN ACCESS
  • 2. Hamza Kheddar Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 5, Issue 3, ( Part -3) March 2015, pp. 44-48 www.ijera.com 45 | P a g e  Reachability: If a covert channel is established, how far can it reach through the Internet? For example, is it likely to be confined within an institution (LAN) or be on a global scale (WAN). In this section, a high level description of each layer of the TCP/IP protocol stack is presented. The characteristics and potential for covert channels of each layer is briefly discussed [8], [9]. In the protocol stack each layer is implemented by one or more protocols (horizontal) and one or more interfaces (vertical), as outlined in Fig. 2. A. Physical layer The physical layer contains all the functions needed to carry the bit stream over a physical medium to connect adjacent nodes. The protocols in this layer depend on the actual transmission medium used. There are a number of barriers that make this layer a difficult environment for establishing, encoding and decoding the covert channel. This would probably require special hardware to be designed and installed. In addition, the diversity of protocols and media mean that different technologies would have to be developed for each type of network which yields to limit the generality. Furthermore, the reachability of the covert channel would be often limited to adjacent nodes (within an institution or some subset thereof) with some limited extension possible where repeaters are in use. B. Link layer The link layer is responsible for organizing the bit stream into a data unit called a frame and delivery the frames between adjacent nodes on a network. It provides physical addressing (port number), and error detection (such as cyclical redundancy check). The link layer also includes the Media Access Control (MAC) sub-layer, which provides physical addressing and channel access control mechanisms that enable several terminals or network nodes to communicate in a network. There are a number of technical difficulties that would need to be overcome to establish covert channels at this level. Special hardware or low level device driver programming is necessary, because different types of network such as Ethernet, ATM and Token-Ring have different link layer protocols. The reachability of covert channels at this layer will often be limited to a LAN (within an institution) as long as there are logical and physical limits, with some limited extension possible where level-3 network router are in use. Two potential ways in which the link layer may be used for covert channels are given on [8], [9]. Firstly, the collision detection system (Carrier Sense Multiple Access / Collision Detection CSMA/CD) in the Ethernet link layer can be modified to transmit hidden data by adjusting the collision control mechanism. Secondly, unused portions of the frame can be used to store covert data. Covert data can be stored in the buffer, beginning at the end toward the valid data. When the packet is transmitted, the entire buffer is exported, including the covert data. C. Network layer The network layer delivers data in the form of a packet from source to destination, across as many links as necessary. At the Network layer, the packets of the communication need to be identified with the source and destination addresses of the two end nodes. With IPv4, this means that each packet has a 32-bit source address and a 32-bit destination address in the IP protocol header. The IP protocol defines the addressing system and how intermediary nodes should treat packets. Each packet can be independently routed from source to destination. It provides a best effort service to higher layers. The network layer also contains control and routing protocols. Covert channels can be created at the network layer; however this is requiring device driver programming or alteration of operating system code. Developing a single technology to establish covert channels in the network layer, would yield a high degree of generality and global reachability. Analysis of the IP header shows the existence of bits that are either unused or optional. Consequently, fields from the IP header can be manipulated to store covert data. An extended analysis of using the IP identification field as a covert channel is presented later in this paper. D. Transport layer Process-to-process delivery is the task of the transport layer. Getting a packet to the destination system is not quite the same thing as determining which process should receive the packet’s content. A system can be running file transfer, email, and other network processes all at the same time, and all over Application Application Transport Transport Network Network protocol Data link Data link interface Physical Physical
  • 3. Hamza Kheddar Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 5, Issue 3, ( Part -3) March 2015, pp. 44-48 www.ijera.com 46 | P a g e a single physical interface. Naturally, the destination process has to know on which process the sender originated the bits inside the packet in order to reply. There are two main Internet transport protocols: the Universal Datagram Protocol (UDP) and the Transmission Control Protocol (TCP). TCP is a connection-oriented, “reliable” service that provides ordered delivery of packet contents. UDP is a connectionless, “unreliable” service that does not provide ordered delivery of packet contents [10]. The location of transport protocol implementations within the operating system, make the technical difficulties in creating covert channels similar to the Internet layer. The creation of adapted device drivers or the modification of operating system source code is likely to be necessary. It is variously estimated that over 80% all Internet traffic [11] is carried by TCP therefore establishing a covert channel within TCP provides a high level of generality. The fact that TCP is an end-to-end protocol gives it global reachability. In addition, the TCP header is more complex than IP and has a significant array of options, which means there is more potential for the creation of such channels. Two examples of using TCP fields to covert channels [12], [13] are given below: 1) Initial Sequence Number Field: The Initial Sequence Number (ISN) field of the TCP/IP protocol suite enables a client to establish a reliable protocol negotiation with a remote server. As part of the negotiation process for TCP/IP, several steps are taken in what is commonly called a "three way handshake”. For our purposes, the sequence number field serves as a good medium for transmitting clandestine data because of its size (a 32 bit number). Hence, there are a number of possible hiding methods to use. The simplest is to generate the sequence number from our actual ASCII character we wish to have encoded. 2) The TCP Acknowledge Sequence Number Field: This method, called "Bounce", relies upon basic spoofing of IP addresses to enable a sending host to "bounce" a packet of information outside of a remote site and have that site return the packet to the real destination address. This has the benefit of concealing the packet sender as it appears to come from the "bounce" host. This method could be used to set up an anonymous one-way communication network that would be difficult to detect especially if the bounce server is very busy. This method relies on the characteristic of TCP/IP where the destination server responds to an initial connect request (SYN packet) with a SYN/ACK packet containing the original initial sequence number plus one (ISN+1). E. Application layer This layer handles issues like network transparency, resource allocation and problem partitioning. The application layer is concerned with the user’s view of the network, such as formatting e- mail messages [10]. It contains a diverse range of protocols for applications such as email, remote administration, World Wide Web (WWW) and Peer- to-Peer content distribution. An important application is DNS (Domain Name System) which translates host names into IP addresses. The technical difficulties in creating covert channels are easiest to overcome at the application layer where limited or no programming skills may be required. The diversity of protocols make the generality of a technical solution limited, however most networked computers can be expected to support common protocols such HTTP and SNMP. So, reachability will be global. The application layer is nearest the user who can create applications utilising system resources including the network. Many of the classical steganographic approaches can be used at the application level. For example, a covert messaging system can be devised using word substitution in an email system. For all these types of steganographic (TCP/IP protocols Steganography) methods mentioned on this paper, achieved steganographic bandwidth can be expressed as follows [14]: 𝑃𝑅𝐵𝑅 𝑁𝑆 = 𝑆𝐵0 + 𝑆𝐵𝑗 𝑙 𝑗=1 𝑙 + 1 𝑏𝑖𝑡𝑠/𝑝𝑎𝑐𝑘𝑒𝑡 (1) Where: - 𝑃𝑅𝐵𝑅 𝑁𝑆 (Packet Raw Bit Rate) denotes bandwidth of the covert channel created by TCP/IP steganography [bits/packet]. - 𝑆𝐵0 is the total amount of bits for TCP/IP protocols that can be covertly send in the fields of the first packet. - 𝑆𝐵𝑗 denotes total amount of bits for TCP/IP protocols that can be covertly sent in the fields of the following packets, 𝑙 is number of packets send besides first packet. III. IMPLEMENTATION OF COVERT CHANNEL BASED ON IP IDENTIFICATION FIELD In this section, we present a network steganographic method based on hiding data in identification field which located on the IP header. Our implementation of a VoIP network system was carried out by using the Network Simulator NS-3 [15] to obtain realistic scenario of IP packet transmission. Fig.3 shows the point-to-point topology used in the simulation. It is a common configuration where traffic is generated from one node of a network and forwarded to other node. This output link is
  • 4. Hamza Kheddar Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 5, Issue 3, ( Part -3) March 2015, pp. 44-48 www.ijera.com 47 | P a g e represented by an Ethernet link between the first Ethernet network node and the other side node. Our steganographic method has been implemented on IP header situated exactly on the layer three of IP protocol. It means that we have extended the IP protocol with an algorithm to enable covert channel on identification field. Notice that our simulation was carried out with traffic sources Constant Bit Rate (CBR) of 5 Mbits and 2 ms for the delay. In our simulation of the covert channel based on IP header identification field, we have transmitted the data word “hello” as a secret message, the actual packet data does not matter. We have tested it in text format which is the easiest way for result exhibition and we can decode it from ASCII format to text format manually. The implementation of this method gives the result shown fig.4. Node 0 Node 1 TCP TCP IP 10.1.1.1 IP 10.1.1.2 Point-to-point Point-to-point Fig. 3 Topology used in the simulation. Fig. 4 shows an example of trace file for the captured packet transmitted during the communication between the two nodes. The file can be generated either with .tr format which can be read by a simple software like Notepad (software exist on windows), or with .pcap format which can be read by Wireshark software [16].As we can see clearly in this figure, the first identification field (id) of the first packet equal 0, the second id equal 104 which is the ASCII code of the letter h, the third id equal 101 which is the ASCII code of the letter e, the fourth id equal 108 which is the ASCII code of the letter l, the fifth id equal 108 which is the ASCII code of the letter l and so on. Notice that the first identification field (id) of the first packet equal 0 (fig.4), this value ( 𝑆𝐵0 in Eq.1) differs from the values achieved for the following packets ( 𝑆𝐵𝑗 𝑙 𝑗 =1 in Eq. 1) because in the first packet initial values of certain fields can be used (e.g. sequence number for TCP protocol) [14]. In our simulation, we have sent 20 packets, while our secret message “hello” needs 6 packets to be completely transferred (1 packet for each character plus 1 for the first packet), so it remain 14 packets, hence our covert channel will be created for the 6 packets then, our implementation assigns the default value of identification field which NS-3 generate it without covert channel (default configuration) for each remaining packet. It is also worth noting that we can represent a 32-bit IPv4 address as a 128-bit IPv6 address by implementing or activating an existing transition mechanism such as dual stack, IPv4 compatible address formats or Tunneling mechanisms[17], thus our method of steganography can pass through an IPv6 network. Consequently the reachability will be much more global than before. IV. CONCLUSION In this paper, we presented first an analysis of the potential for covert channels in each layer of the TCP/IP protocol stack. The analysis revealed that the network and transport layers, which they have consecutively the IP and the TCP protocols, are the most vulnerable to the creation of covert channels. The implementation confirms that the identification field in the IPv4 can be used to store a specific value to be passed to the other end, so it is possible to use this method to pass data between hosts in any IP packet. Fig. 4 Trace file of the end-to-end communication scenario. 5Mbit, 2ms
  • 5. Hamza Kheddar Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 5, Issue 3, ( Part -3) March 2015, pp. 44-48 www.ijera.com 48 | P a g e Our future work aim is to develop a mechanism to make relationship between the network Steganography (covert channels) based on protocols and the data hiding applied on speech coder. In other word, developing a method to control the covert channels based on protocols via payload coded data and vise versa. REFERENCES [1] B. W Lampson. A Note on the Confinement Problem. USA, Xerox Palo Alto Research Center, 1973. [2] S. Berg, Glossary of Computer Security Terms. USA, National Computer Security Center, 1998. [3] N. E. Proctor, P. G. Neumann, Architectural implications of Covert Channels. USA, Computer Science Lab, SRI International, 1992. [4] W. Mazurczyk, Z .Kotulski, New Security and Control Protocol for VoIP Based on Steganography and Digital Watermarking. In Proc. of: IBIZA 2006, Kazimierz Dolny, Poland, 2006. [5] W. Mazurczyk, Z. Kotulski, New VoIP Traffic Security Scheme with Digital Watermarking. In: J. Górski, SAFECOMP 2006. LNCS, vol. 4166, pp. 170–181. Springer, Heidelberg, 2006. [6] US Department of Defense, Department of Defense Trusted Computer System Evaluation Criteria, DOD 5200.28-STD (The Orange Book1985). [7] D. Llamas, Covert channel analysis and data hiding in the TCP/IP protocol suite. Honours Project Thesis. UK, Napier University, 2004. [8] C. G. Girling, Covert Channels in LAN`s. USA, IEEE Transactions on Software Engineering, 1987. [9] T. G. Handeland, M. T. Sandford. Hiding Data in the OSI Network Model. USA, Weapon Design Technology Group, Los Alamos National Laboratory, 1996. [10] D. Howe, “FOLDOC Computer Dictionary”. USA, Webnox Corp 2003. [11] S. Lam, Back to the Future Part 4: The Internet. USA, ACM SIGCOMM Computer Communication Review, 2005. [12] Route Project Loki: ICMP Tunnelling. USA, Phrack Magazine 1996. [13] Rowland, C. H. USA,Vol.2 No.5- First Monday Magazine, 1996. [14] W. Mazurczyk and K. Szczypiorski Steganography of VoIP Streams. OTM 2008, Part II, LNCS 5332, pp. 1001–1018, Springer- Heidelberg 2008. [15] (2014) The ns-3 website. [Online]. Available: www.nsnam.org/ [16] (2014) The wireshark website.[Online].Available: https://www.wireshark.org/. [17] Sun Microsystems (2014) System Administration Guide Volume 3, chapter 15”Transition from IPv4 to IPv6” homepage. [Online]. Available: www.docs.oracle.com/cd/E19455-01/806 0916/index.html.