Review Article

A Survey of Key Technologies for Constructing Network Covert Channel

Table 7

Attack against covert channels.

LevelCovert channelEliminationLimitationDetection

Communication contentCovert timing channelsAdding delays(i) Detecting traffic shape.
(ii) Detecting traffic regularity.
(iii) Detecting traffic randomness.
(iv) ML or DL technology.
Covert storage channelsTraffic normalizationML or DL technology.

Transmission networkProxy(i) IP blocking
(ii) URL blocking
(i) Regular expressions.
(ii) Traffic watermark.
(iii) ML or DL technology.
Anonymous communication(i) Blocking the IPs of mix nodes
(ii) Blocking official homepages
(iii) Poisoning DNS resolutions
(i) Detecting mix nodes: ML or DL technology.
(ii) Detecting the association between nodes: Sybil attack, etc.