Review Article

A Survey of Key Technologies for Constructing Network Covert Channel

Table 2

The summary of typical CSCs and CTCs.

Covert channelCategorySamanic preservingSyntax preservingNoiselessStatisticsDescription

Cabuk et al. [52]C1The on-off CTC.
Shah et al. [43]C1The jitterbug CTC.
Brodley and Spafford [44]C1The time-replay CTC.
Sellke et al. [45]C1The L-N CTC.
Liu et al. [53]C1A improved method for selecting interval time in [44].
Li et al. [46]C2Consuming switch performance to affect throughput.
Tahir et al. [47]C3A high speed covert channels in data center networks
Zhang et al. [54]C3Modify numbers of video packets.
Ahsan and Kundur [55]C3Modify the order of IPSec packets.
Zhang et al. [56]C3Postpone or extend the silence periods over VoLTE.
Krtzer et al. [57]C4Duplicate selected IEEE 802.11 packets.
Mazurczyk et al. [48]C4Retransmit a packet which carries secrets.
Schulz et al. [58]C5Modulate the size of IPSec packets.
Luo et al. [49]C5Modulate the size of TCP databursts.
Rios et al. [59]C6Adjust the options in the DHCP protocol.
Zhang et al. [60]C6An enlarging-the-capacity packet sorting covert channel.
Wang et al. [17]C7Utilize LSB in some header fields.
Trabelsi et al. [61]C7Utilize ICMP payload.
Rowland [50]C8Utilize unused areas in the IPv4 and TCP header.
Lucena et al. [31]C8Utilize unused areas in the IPv6 header and its extensions.
Liu et al. [51]C9A video steganography scheme based on chaotic mapping.
Kadhim et al. [62]C9A image steganography scheme based on the mapping function of genetic algorithm.