Open Access
ARTICLE
A Distributed Covert Channel of the Packet Ordering Enhancement Model Based on Data Compression
1 College of Information Engineering, Yangzhou University, Yangzhou, 225127, China.
2 Division of Computer Science, University of Aizu, Aizu-Wakamatsu, 9658580, Japan.
3 College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics,
Nanjing, 211106, China.
4 College of Information and Communication Engineering, Harbin Engineering University, Harbin, 150001, China.
5 Department of Computer Software Engineering, Soonchunhyang University, Asan, Korea.
* Corresponding Author: Donghai Guan. Email: .
Computers, Materials & Continua 2020, 64(3), 2013-2030. https://doi.org/10.32604/cmc.2020.011219
Received 27 April 2020; Accepted 12 May 2020; Issue published 30 June 2020
Abstract
Covert channel of the packet ordering is a hot research topic. Encryption technology is not enough to protect the security of both sides of communication. Covert channel needs to hide the transmission data and protect content of communication. The traditional methods are usually to use proxy technology such as tor anonymous tracking technology to achieve hiding from the communicator. However, because the establishment of proxy communication needs to consume traffic, the communication capacity will be reduced, and in recent years, the tor technology often has vulnerabilities that led to the leakage of secret information. In this paper, the covert channel model of the packet ordering is applied into the distributed system, and a distributed covert channel of the packet ordering enhancement model based on data compression (DCCPOEDC) is proposed. The data compression algorithms are used to reduce the amount of data and transmission time. The distributed system and data compression algorithms can weaken the hidden statistical probability of information. Furthermore, they can enhance the unknowability of the data and weaken the time distribution characteristics of the data packets. This paper selected a compression algorithm suitable for DCCPOEDC and analyzed DCCPOEDC from anonymity, transmission efficiency, and transmission performance. According to the analysis results, it can be seen that DCCPOEDC optimizes the covert channel of the packet ordering, which saves the transmission time and improves the concealment compared with the original covert channel.Keywords
Cite This Article
Citations
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.