A Survey of Network Covert Channel: Construction and Detection

Xuhan Kou, Yin Lei, Chennan Guo, Yihang Wei, Zhuo Chen, Xiangbo Yuan, Keke Gai*

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Network covert channels facilitate the transmission of secret information in an undetectable manner. In this survey, we systematically study fundamental concepts, construction techniques, and detection methods of network covert channels. The channels are categorized into two types, namely, storage-based covert channels and timing-based covert channels. The former utilizes redundancy in protocol fields to embed information, while the latter transmits data by modulating traffic intervals. The timing-based channel primarily enhances concealment by adjusting the packet intervals and integrating protocol features, while the storage-based channel embeds information using redundant fields of each protocol layer. In terms of detection methods, timing-based channels are identified through statistical analysis of traffic patterns combined with machine learning models. Conversely, storage-based channels are typically uncovered by implementing protocol compliance verification and deep packet inspection of header fields and payload data. This survey investigates the evolution path of network covert channel construction and detection technologies in details, providing a theoretical foundation for the design of future network covert communication solutions.

Original languageEnglish
Title of host publicationProceedings - 2025 IEEE 11th Conference on Big Data Security on Cloud, BigDataSecurity 2025
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages145-153
Number of pages9
ISBN (Electronic)9798331595104
DOIs
Publication statusPublished - 2025
Externally publishedYes
Event11th IEEE International Conference on Big Data Security on Cloud, BigDataSecurity 2025 - New York City, United States
Duration: 9 May 202511 May 2025

Publication series

NameProceedings - 2025 IEEE 11th Conference on Big Data Security on Cloud, BigDataSecurity 2025

Conference

Conference11th IEEE International Conference on Big Data Security on Cloud, BigDataSecurity 2025
Country/TerritoryUnited States
CityNew York City
Period9/05/2511/05/25

Keywords

  • construction
  • covert channel
  • covert communication
  • detection

Fingerprint

Dive into the research topics of 'A Survey of Network Covert Channel: Construction and Detection'. Together they form a unique fingerprint.

Cite this