Download Shareware and Freeware Software for Windows, Linux, Macintosh, PDA

line Home  |  About Us  |  Link To Us  |  FAQ  |  Contact

Serving Software Downloads in 956 Categories, Downloaded 50.270.442 Times

Covert Channels Evaluation Framework 0.1

Company: Sebastian Zander
Date Added: September 10, 2013  |  Visits: 601

Covert Channels Evaluation Framework

Report Broken Link
Printer Friendly Version


Product Homepage
Download (64 downloads)



Covert Channels Evaluation Framework (CCHEF) is a software framework for empirically evaluating covert channels in network protocols running under Linux.<br /><br />Using encryption is not sufficient to secure communication because the simple fact that communication exists is often enough to raise suspicion and take further actions. Covert channels aim to hide the very existence of communication by using means of communication not normally intended to be used. The huge amount of data and vast number of different protocols in the Internet makes it ideal as a high-bandwidth vehicle for covert channels in network protocols.<br /><br />The de-facto standard covert channel communication model is the prisoner problem. Two people, Alice and Bob, are thrown into prison and intend to escape. To agree on an escape plan they need to communicate, but Wendy the warden monitors all their messages. If Wendy finds any signs of suspicious messages she will place Alice and Bob into solitary confinement -- making an escape impossible. Alice and Bob must exchange innocuous messages containing hidden information that (hopefully) Wendy will not notice.<br /><br />We have developed a flexible software framework for empirically evaluating covert channels in network protocols called Covert Channels Evaluation Framework (CCHEF). CCHEF runs under Linux and can be used in real networks with real overt traffic, but can also emulate covert channels using overt traffic from trace files. Usually testing with real traffic is restricted to controlled testbeds where it is almost impossible to generate a realistic traffic mix from a larger number of hosts. Therefore, CCHEF also runs on single hosts emulating covert channels based on overt traffic from trace files.<br /><br />CCHEF is not designed to be (mis)used for real covert channel communication. Therefore, we have made no attempts to disguise the sender or receiver in any way, illegally acquire superuser priviledges etc. The sender and receiver are normal user space applications. This allows us to focus on the actual covert channel methods (embedding of hidden information in network protocols), prevents possible misuse, and makes porting easier since techniques to hide executables etc. are very operating system dependent.<br /><br />The central component of CCHEF is the Channel module that interfaces with multiple device modules. Covert data to be send is read from the Covert In device, while received covert data is written to the Covert Out device. The Overt In/Out device taps into a stream of IP packets to be used as carrier for the covert data. At the sender suitable overt packets are intercepted and passed to the Channel module. The Channel module encodes the covert data and passes the modified packet back to the device, which will re-inject it into the network. If an overt packet arrives at the receiver the Channel module decodes any covert information and removes the covert channel (if possible) before re-injecting the packet. (CCHEF also supports passive receivers that uses copies of overt packets and do not delay the actual traffic, if removing the covert channel is not necessary.) The Channel module has various sub-modules responsible for modulation, framing, reliable transport, encryption etc.<br /><br />Figure 1 shows CCHEF transmitting covert information over a network from Alice (covert sender) to Bob (covert receiver). The figure shows a unidirectional channel but in general channels in CCHEF are bi-directional (depending on the available overt traffic).<br />

Requirements: No special requirements
Platforms: *nix, Linux
Keyword: Alice Cchef Channel Channels Communication Covert Covert Channels Evaluation Framework 0 1 Device Information Module Network Overt Packet Packets Protocols Receiver Sender Traffic Wendy
Users rating: 0/10

License: Freeware Size: 542.72 KB
USER REVIEWS
More Reviews or Write Review


COVERT CHANNELS EVALUATION FRAMEWORK RELATED
Networking Tools  -  PC-Info 0.1
PC-Info project is a Server-Client Software using the Adaptive Communication Environment (ACE). Server uses KDE/QT to show the client data. Cmd-line is also possible. Until now the Client can submit IP/Port, Hostname and CPU-Model information....
604.16 KB  
Text Chat Clients  -  infobot 44.3
infobot is an IRC bot written in Perl 5 which implements a sort of artificial intelligence by learning information ("factoids") from channel discussions and then responding intelligently to queries about this accumulated information. In the...
368.64 KB  
Business  -  SSuite Office - Advanced Edition 2.2
Features a full set of communication utilities that allow you to contact everyone on your LAN network or through the internet. With its full 32-bit architecture and stability, SSuite Advance Office can improve your productivity and document...
26.87 MB  
Audio Tools  -  SigBrowser 0.4
SigBrowser is a small tool to display large signals (up to 2 GB filesize / 1-6 channels / 16 bit integer). SigBrowser allows you to smoothly browse in a large signal. It can load 16 bit signed integer data with up to 6 interlaced channels....
122.88 KB  
Audio Tools  -  dvbshout 0.2
dvbshout takes an MPEG transport stream from a DVB card, extracts audio channels from stream, and sends the audio to an Icecast / Shoutcast server. It had only been tested with DVB-S, but should also work with DVB-C and DVB-T. Example run:...
112.64 KB  
Multi-Purpose Audio Players  -  CIP Audio Player for linux 0.6
CIP Audio Player is a cross-platform Java application which works on Linux, Windows and Mac OS X. The CIPAudioPlayer plays back PCM 16Bit/44.1kHz wav-files through the main speakers and center speaker by using different sound-mixer...
10.24 KB  
Audio Tools  -  JackMiniMix 0.2
JackMiniMix is a simple mixer for the Jack Audio Connection Kit with an OSC based control interface. It supports a user configurable number of stereo inputs, which can then be queried and controlled by sending it OSC messages. JackMiniMix is...
102.4 KB  
Modules  -  Elysia Cron 6.x-1.2
Extended cron support with crontab-like scheduling (you can run some cron hooks every day at a specified hour, other only monthly and so on...) and other features: * crontab-like scheduling configuration of each job. * grouping of jobs in channels...
20.48 KB  
Audio Tools  -  dLAN Audio Server 0.1.2
Audio server for the MicroLink dLAN Audio devices from devolo.This server can serve 4 different playlists on the 4 channels of the dLAN Audio device and can be used by several dLAN Audio devices simultaneously.
92.16 KB  
Instant Messagers  -  EZChat Server 0.0.5
EZChat Server is a lightweight chat server for use over a LAN. The purpose is to enable a single channel IRC-like realtime communication in the office.
92.16 KB  
NEW DOWNLOADS IN SECURITY TOOLS, KEY LOGGERS
Security Tools  -  Password Generator 2.0
Password Generator is a free, powerful password generator, thanks to which we can create very strong passwords. The program allows you to generate passwords that are easy to read, remember or write, as well as completely unusual for human language...
20.36 MB  
Security Tools  -  Free AntiSpyware 7.2.5
As powerful and professional anti-spyware software, Free AntiSpyware has ability to detect & stop the latest and most malicious programs that are doing harm to your computer and breaking your privacy. This free spyware remover software helps...
128.08 MB  
Security Tools  -  paraproxy 1.1
paraproxy is a supplement library for paramiko which adds support for SSH2 proxy commands. #md5=0c7041e8d2d7e49b09df526bba3efb28 #md5=1fbb4f888f40a01439ff27458c6210eb #md5=493c0f426e376427c30f3f39ebc8dac1
20.48 KB  
Security Tools  -  pam_smxs 1.6
pam_smxs is a PAM module that authenticates a user using challenge-response. All tokens that support ANSI X9.9 are currently supported and it provides full support for CryptoCard RB1 tokens.
522.24 KB  
Security Tools  -  DoudouLinux 2011-11
DoudouLinux [1] is a system specially designed for children to make computer use as easy and pleasant as possible for them (and for their parents too! [2]). DoudouLinux provides tens of applications that suit children from 2 to 12 years and tries...
964.17 MB