Review Article
A Survey of Key Technologies for Constructing Network Covert Channel
Table 2
The summary of typical CSCs and CTCs.
| Covert channel | Category | Samanic preserving | Syntax preserving | Noiseless | Statistics | Description |
| Cabuk et al. [52] | C1 | | | | | The on-off CTC. | Shah et al. [43] | C1 | | | | | The jitterbug CTC. | Brodley and Spafford [44] | C1 | | | | | The time-replay CTC. | Sellke et al. [45] | C1 | | | | | The L-N CTC. | Liu et al. [53] | C1 | | | | | A improved method for selecting interval time in [44]. | Li et al. [46] | C2 | | | | | Consuming switch performance to affect throughput. | Tahir et al. [47] | C3 | | | | | A high speed covert channels in data center networks | Zhang et al. [54] | C3 | | | | | Modify numbers of video packets. | Ahsan and Kundur [55] | C3 | | | | | Modify the order of IPSec packets. | Zhang et al. [56] | C3 | | | | | Postpone or extend the silence periods over VoLTE. | Krtzer et al. [57] | C4 | | | | | Duplicate selected IEEE 802.11 packets. | Mazurczyk et al. [48] | C4 | | | | | Retransmit a packet which carries secrets. | Schulz et al. [58] | C5 | | | | — | Modulate the size of IPSec packets. | Luo et al. [49] | C5 | | | | — | Modulate the size of TCP databursts. | Rios et al. [59] | C6 | | | | — | Adjust the options in the DHCP protocol. | Zhang et al. [60] | C6 | | | | — | An enlarging-the-capacity packet sorting covert channel. | Wang et al. [17] | C7 | | | | — | Utilize LSB in some header fields. | Trabelsi et al. [61] | C7 | | | | — | Utilize ICMP payload. | Rowland [50] | C8 | | | | — | Utilize unused areas in the IPv4 and TCP header. | Lucena et al. [31] | C8 | | | | — | Utilize unused areas in the IPv6 header and its extensions. | Liu et al. [51] | C9 | | | | — | A video steganography scheme based on chaotic mapping. | Kadhim et al. [62] | C9 | | | | — | A image steganography scheme based on the mapping function of genetic algorithm. |
|
|