Mosul University
  • Register
  • Login
  • العربیة

AL-Rafidain Journal of Computer Sciences and Mathematics

Notice

As part of Open Journals’ initiatives, we create website for scholarly open access journals. If you are responsible for this journal and would like to know more about how to use the editorial system, please visit our website at https://ejournalplus.com or
send us an email to info@ejournalplus.com

We will contact you soon

  1. Home
  2. Volume 8, Issue 2
  3. Authors

Current Issue

By Issue

By Subject

Keyword Index

Author Index

Indexing Databases XML

About Journal

Aims and Scope

Editorial Board

Editorial Staff

Publication Ethics

Indexing and Abstracting

Related Links

Peer Review Process

News

Information Hiding Techniques Using Network Protocols

    Manar Younis Kashmola Ameera Bibo Sallo

AL-Rafidain Journal of Computer Sciences and Mathematics, 2011, Volume 8, Issue 2, Pages 35-50
10.33899/csmj.2011.163650

  • Show Article
  • Download
  • Cite
  • Statistics
  • Share

Abstract

The covert channels of type covert storage channels were used in this research to hide textual data or an (image hiding secrete data) in the transmission protocol layer and the internet protocol layer of TCP/IP module. We use IP protocol in designing covert channel by using Identification field, and use TCP protocol in designing covert channel by using Urgent Pointer  field, and UDP by using Source Port field. Finally ICMP protocol by using Echo request message and Message field.
 The result of Covert channel after analyzing the protocols (IP, TCP, UDP, ICMP) header depends on the field that used in the designing the Covert channel. The access ratio of hidden data in the two protocols TCP/IP was %100. UDP protocol on the other hand depends on a mechanism of unsafe communication. ICMP protocol provided a good transmission, though unreliable, in that the message structure can be unreliable or clear.
 
Keywords:
    Information Hiding Network Protocols Covert channel Hiding Information in TCP UDP ICMP IGMP
  • PDF (851 K)
  • XML
(2011). Information Hiding Techniques Using Network Protocols. AL-Rafidain Journal of Computer Sciences and Mathematics, 8(2), 35-50. doi: 10.33899/csmj.2011.163650
Manar Younis Kashmola; Ameera Bibo Sallo. "Information Hiding Techniques Using Network Protocols". AL-Rafidain Journal of Computer Sciences and Mathematics, 8, 2, 2011, 35-50. doi: 10.33899/csmj.2011.163650
(2011). 'Information Hiding Techniques Using Network Protocols', AL-Rafidain Journal of Computer Sciences and Mathematics, 8(2), pp. 35-50. doi: 10.33899/csmj.2011.163650
Information Hiding Techniques Using Network Protocols. AL-Rafidain Journal of Computer Sciences and Mathematics, 2011; 8(2): 35-50. doi: 10.33899/csmj.2011.163650
  • RIS
  • EndNote
  • BibTeX
  • APA
  • MLA
  • Harvard
  • Vancouver
  • Article View: 53
  • PDF Download: 62
  • LinkedIn
  • Twitter
  • Facebook
  • Google
  • Telegram
  • Home
  • Glossary
  • News
  • Aims and Scope
  • Privacy Policy
  • Sitemap
This journal is licensed under a Creative Commons Attribution 4.0 International (CC-BY 4.0)

Powered by eJournalPlus