\relax 
\ifx\hyper@anchor\@undefined
\global \let \oldcontentsline\contentsline
\gdef \contentsline#1#2#3#4{\oldcontentsline{#1}{#2}{#3}}
\global \let \oldnewlabel\newlabel
\gdef \newlabel#1#2{\newlabelxx{#1}#2}
\gdef \newlabelxx#1#2#3#4#5#6{\oldnewlabel{#1}{{#2}{#3}}}
\AtEndDocument{\let \contentsline\oldcontentsline
\let \newlabel\oldnewlabel}
\else
\global \let \hyper@last\relax 
\fi

\newlabel{fig:logo2}{{}{1}{\relax }{}{}}
\citation{jour2}
\citation{acm1}
\citation{lnotes2}
\citation{book1}
\citation{lnotes2}
\citation{lnotes3}
\citation{proceeding2}
\@writefile{toc}{\contentsline {chapter}{\numberline {1}Introduction}{2}{chapter.1}}
\@writefile{lof}{\addvspace {10\p@ }}
\@writefile{lot}{\addvspace {10\p@ }}
\citation{springer1}
\citation{sugg}
\citation{treport1}
\@writefile{lof}{\contentsline {figure}{\numberline {1.1}{\ignorespaces Covert Channel Visualization}}{3}{figure.1.1}}
\newlabel{fig:Fig1-Covert}{{1.1}{3}{Covert Channel Visualization\relax }{figure.1.1}{}}
\@writefile{toc}{\contentsline {section}{\numberline {1.1}Covert Channel Terminology}{3}{section.1.1}}
\citation{springer3}
\citation{proceeding3}
\citation{proceeding4}
\citation{preport}
\citation{lnotes2}
\citation{book5}
\citation{book6}
\citation{book7}
\citation{sym}
\citation{springer1}
\citation{book1}
\citation{acm1}
\@writefile{toc}{\contentsline {section}{\numberline {1.2}Motivation and Importance}{6}{section.1.2}}
\@writefile{toc}{\contentsline {section}{\numberline {1.3}Scope}{7}{section.1.3}}
\@writefile{toc}{\contentsline {section}{\numberline {1.4}Objective}{7}{section.1.4}}
\@writefile{toc}{\contentsline {section}{\numberline {1.5}Document Conventions}{8}{section.1.5}}
\@writefile{toc}{\contentsline {section}{\numberline {1.6}Intended Audience and Reading Suggestion}{8}{section.1.6}}
\citation{springer3}
\@writefile{toc}{\contentsline {chapter}{\numberline {2}Literature Survey}{9}{chapter.2}}
\@writefile{lof}{\addvspace {10\p@ }}
\@writefile{lot}{\addvspace {10\p@ }}
\@writefile{lof}{\contentsline {figure}{\numberline {2.1}{\ignorespaces Pipeline Problem}}{9}{figure.2.1}}
\newlabel{fig:fig2-Pipepline}{{2.1}{9}{Pipeline Problem\relax }{figure.2.1}{}}
\@writefile{toc}{\contentsline {section}{\numberline {2.1}Importance of Covertness and Layers of Attack}{10}{section.2.1}}
\citation{lnotes2}
\citation{springer3}
\citation{acm1}
\@writefile{lof}{\contentsline {figure}{\numberline {2.2}{\ignorespaces Layers of Attack}}{11}{figure.2.2}}
\newlabel{fig:layers}{{2.2}{11}{Layers of Attack\relax }{figure.2.2}{}}
\@writefile{toc}{\contentsline {section}{\numberline {2.2}Covert Channel Classification}{11}{section.2.2}}
\citation{springer3}
\citation{acm1}
\citation{lnotes4}
\citation{lnotes5}
\citation{lnotes6}
\@writefile{lof}{\contentsline {figure}{\numberline {2.3}{\ignorespaces Illustrating Noisy Covert Channel Scenario}}{12}{figure.2.3}}
\newlabel{fig:fig4-ncc}{{2.3}{12}{Illustrating Noisy Covert Channel Scenario\relax }{figure.2.3}{}}
\citation{jour2}
\citation{acm1}
\@writefile{lof}{\contentsline {figure}{\numberline {2.4}{\ignorespaces Noiseless Covert Channel}}{13}{figure.2.4}}
\newlabel{fig:fig4a-noiseless}{{2.4}{13}{Noiseless Covert Channel\relax }{figure.2.4}{}}
\@writefile{lof}{\contentsline {figure}{\numberline {2.5}{\ignorespaces Storage Covert Channel}}{13}{figure.2.5}}
\newlabel{fig:fig4b-storage}{{2.5}{13}{Storage Covert Channel\relax }{figure.2.5}{}}
\citation{jour2}
\citation{acm1}
\citation{acm2}
\@writefile{lof}{\contentsline {figure}{\numberline {2.6}{\ignorespaces Client-Server Communication using File-Lock}}{14}{figure.2.6}}
\newlabel{fig:fig4c-filelock}{{2.6}{14}{Client-Server Communication using File-Lock\relax }{figure.2.6}{}}
\@writefile{lof}{\contentsline {figure}{\numberline {2.7}{\ignorespaces Timing Covert Channel}}{15}{figure.2.7}}
\newlabel{fig:fig4d-timing}{{2.7}{15}{Timing Covert Channel\relax }{figure.2.7}{}}
\@writefile{lof}{\contentsline {figure}{\numberline {2.8}{\ignorespaces Illustrative Example of Timing Covet Channel}}{15}{figure.2.8}}
\newlabel{fig:fig4e-timing}{{2.8}{15}{Illustrative Example of Timing Covet Channel\relax }{figure.2.8}{}}
\citation{springer3}
\citation{acm1}
\@writefile{lof}{\contentsline {figure}{\numberline {2.9}{\ignorespaces Illustrative Example of Trapdoor in DoS \GenericError  {               }{LaTeX Error: There's no line here to end}{See the LaTeX manual or LaTeX Companion for explanation.}{Your command was ignored.\MessageBreak Type  I <command> <return>  to replace it with another command,\MessageBreak or  <return>  to continue without it.}\par \let \reserved@d =*\def \par }}{16}{figure.2.9}}
\newlabel{fig:fig4r-trapdoor}{{2.9}{16}{Illustrative Example of Trapdoor in DoS \\(a) Normal code snippet for login and (b) Trapdoor inserted for DoS}{figure.2.9}{}}
\citation{springer3}
\citation{springer2}
\citation{book1}
\citation{springer1}
\citation{book1}
\citation{springer3}
\citation{treport}
\citation{book4}
\citation{springer1}
\@writefile{toc}{\contentsline {subsection}{\numberline {2.2.1}Prisoner's Problem}{18}{subsection.2.2.1}}
\@writefile{lof}{\contentsline {figure}{\numberline {2.10}{\ignorespaces Courtesy: Sardar Cabuk et.al. IP Covert Channel Detection}}{18}{figure.2.10}}
\newlabel{fig:fig4t-prisoner}{{2.10}{18}{Courtesy: Sardar Cabuk et.al. IP Covert Channel Detection\relax }{figure.2.10}{}}
\citation{jour2}
\@writefile{toc}{\contentsline {section}{\numberline {2.3}Practical Implementation of Transport Layer Based Hybrid Covert Channel}{19}{section.2.3}}
\citation{jour1}
\citation{proceeding2}
\citation{book4}
\@writefile{lof}{\contentsline {figure}{\numberline {2.11}{\ignorespaces Hybrid Covert Channel (Hybrid NCT/SCSL)}}{20}{figure.2.11}}
\newlabel{fig:fig5-SSL}{{2.11}{20}{Hybrid Covert Channel (Hybrid NCT/SCSL)\relax }{figure.2.11}{}}
\@writefile{toc}{\contentsline {subsection}{\numberline {2.3.1}NCT - SNCC Implementation}{20}{subsection.2.3.1}}
\@writefile{lof}{\contentsline {figure}{\numberline {2.12}{\ignorespaces 32 Bit TCP Header}}{21}{figure.2.12}}
\newlabel{fig:fig6-inf}{{2.12}{21}{32 Bit TCP Header\relax }{figure.2.12}{}}
\@writefile{lof}{\contentsline {figure}{\numberline {2.13}{\ignorespaces Depicting the information encoding /decoding as trapdoors and also the modified packet processing in the transport layer in presence of covert users}}{22}{figure.2.13}}
\newlabel{fig:fig6-TCP}{{2.13}{22}{Depicting the information encoding /decoding as trapdoors and also the modified packet processing in the transport layer in presence of covert users\relax }{figure.2.13}{}}
\@writefile{toc}{\contentsline {subsection}{\numberline {2.3.2}SCSL Implementation}{22}{subsection.2.3.2}}
\citation{book1}
\citation{book2}
\citation{springer2}
\citation{book3}
\citation{springer2}
\citation{jour2}
\citation{ukn}
\@writefile{toc}{\contentsline {chapter}{\numberline {3}Software Requirement Specification}{26}{chapter.3}}
\@writefile{lof}{\addvspace {10\p@ }}
\@writefile{lot}{\addvspace {10\p@ }}
\@writefile{toc}{\contentsline {section}{\numberline {3.1}System Description}{26}{section.3.1}}
\@writefile{toc}{\contentsline {section}{\numberline {3.2}Product Perspective}{26}{section.3.2}}
\@writefile{toc}{\contentsline {section}{\numberline {3.3}Assumptions, Constraints and Dependencies}{26}{section.3.3}}
\citation{lnotes3}
\@writefile{toc}{\contentsline {section}{\numberline {3.4}External Interface Requirements}{27}{section.3.4}}
\@writefile{toc}{\contentsline {subsection}{\numberline {3.4.1}Hardware Interface}{27}{subsection.3.4.1}}
\citation{URL}
\citation{book11}
\citation{manual}
\citation{book10}
\citation{book11}
\@writefile{toc}{\contentsline {subsection}{\numberline {3.4.2}Software Interface}{28}{subsection.3.4.2}}
\@writefile{toc}{\contentsline {subsection}{\numberline {3.4.3}Communication Interface}{28}{subsection.3.4.3}}
\@writefile{toc}{\contentsline {subsection}{\numberline {3.4.4}User Interface}{28}{subsection.3.4.4}}
\@writefile{toc}{\contentsline {section}{\numberline {3.5}Functional Requirement}{28}{section.3.5}}
\@writefile{toc}{\contentsline {subsection}{\numberline {3.5.1}Hybrid Covert Channel in noisy legitimate communication}{30}{subsection.3.5.1}}
\@writefile{lof}{\contentsline {figure}{\numberline {3.1}{\ignorespaces Hybrid Covert Channel}}{30}{figure.3.1}}
\newlabel{fig:HCC}{{3.1}{30}{Hybrid Covert Channel\relax }{figure.3.1}{}}
\@writefile{toc}{\contentsline {subsection}{\numberline {3.5.2}Component Covert Channel in Transport Layer (TCP)}{31}{subsection.3.5.2}}
\@writefile{lof}{\contentsline {figure}{\numberline {3.2}{\ignorespaces Component Covert Channel}}{31}{figure.3.2}}
\newlabel{fig:Component covert Channel}{{3.2}{31}{Component Covert Channel\relax }{figure.3.2}{}}
\@writefile{toc}{\contentsline {subsection}{\numberline {3.5.3}Component Subliminal Channel in Secured Socket Layer (SSL)}{32}{subsection.3.5.3}}
\@writefile{lof}{\contentsline {figure}{\numberline {3.3}{\ignorespaces Component Subliminal Channel}}{32}{figure.3.3}}
\newlabel{fig:CSC}{{3.3}{32}{Component Subliminal Channel\relax }{figure.3.3}{}}
\@writefile{toc}{\contentsline {subsection}{\numberline {3.5.4}Detection of Hybrid Covert Channel}{33}{subsection.3.5.4}}
\@writefile{lof}{\contentsline {figure}{\numberline {3.4}{\ignorespaces Detection of Hybrid Covert Channel}}{33}{figure.3.4}}
\newlabel{fig:Detection}{{3.4}{33}{Detection of Hybrid Covert Channel\relax }{figure.3.4}{}}
\@writefile{toc}{\contentsline {subsection}{\numberline {3.5.5}Elimination of Hybrid Covert Channel}{34}{subsection.3.5.5}}
\@writefile{lof}{\contentsline {figure}{\numberline {3.5}{\ignorespaces Elimination of Hybrid Covert Channel}}{34}{figure.3.5}}
\newlabel{fig:elimiantion}{{3.5}{34}{Elimination of Hybrid Covert Channel\relax }{figure.3.5}{}}
\@writefile{toc}{\contentsline {subsection}{\numberline {3.5.6}Broadcast Event}{35}{subsection.3.5.6}}
\@writefile{lof}{\contentsline {figure}{\numberline {3.6}{\ignorespaces BroadCast Event}}{35}{figure.3.6}}
\newlabel{fig:be}{{3.6}{35}{BroadCast Event\relax }{figure.3.6}{}}
\citation{book3}
\@writefile{toc}{\contentsline {section}{\numberline {3.6}Non-Functional Requirement}{36}{section.3.6}}
\@writefile{toc}{\contentsline {subsection}{\numberline {3.6.1}Performance Requirements}{36}{subsection.3.6.1}}
\@writefile{toc}{\contentsline {subsection}{\numberline {3.6.2}Safety Requirement}{36}{subsection.3.6.2}}
\@writefile{toc}{\contentsline {subsection}{\numberline {3.6.3}Business Rules}{36}{subsection.3.6.3}}
\@writefile{toc}{\contentsline {subsection}{\numberline {3.6.4}Security}{37}{subsection.3.6.4}}
\citation{treport2}
\@writefile{toc}{\contentsline {chapter}{\numberline {4}Software Detailed Design}{38}{chapter.4}}
\@writefile{lof}{\addvspace {10\p@ }}
\@writefile{lot}{\addvspace {10\p@ }}
\@writefile{toc}{\contentsline {section}{\numberline {4.1}System Organization}{38}{section.4.1}}
\citation{book8}
\citation{book4}
\@writefile{lof}{\contentsline {figure}{\numberline {4.1}{\ignorespaces System Organisation}}{39}{figure.4.1}}
\newlabel{fig:System_Organisation}{{4.1}{39}{System Organisation\relax }{figure.4.1}{}}
\@writefile{toc}{\contentsline {section}{\numberline {4.2}Architectural Design}{39}{section.4.2}}
\citation{url2}
\citation{url3}
\citation{treport2}
\@writefile{lof}{\contentsline {figure}{\numberline {4.2}{\ignorespaces Layerd Architecture}}{40}{figure.4.2}}
\newlabel{fig:Fig-Layerdmodel}{{4.2}{40}{Layerd Architecture\relax }{figure.4.2}{}}
\citation{book12}
\citation{book13}
\citation{book8}
\@writefile{toc}{\contentsline {section}{\numberline {4.3}Design Methodology}{41}{section.4.3}}
\@writefile{toc}{\contentsline {subsection}{\numberline {4.3.1}Component Based Software Engineering (CBSE)}{41}{subsection.4.3.1}}
\@writefile{lof}{\contentsline {figure}{\numberline {4.3}{\ignorespaces UML Component Diagram}}{42}{figure.4.3}}
\newlabel{fig:componentDiagramUML2}{{4.3}{42}{UML Component Diagram\relax }{figure.4.3}{}}
\citation{book8}
\citation{book10}
\citation{book10}
\@writefile{lof}{\contentsline {figure}{\numberline {4.4}{\ignorespaces CBSE Process}}{43}{figure.4.4}}
\newlabel{fig:fig-CBSE}{{4.4}{43}{CBSE Process\relax }{figure.4.4}{}}
\citation{url4}
\@writefile{toc}{\contentsline {subsection}{\numberline {4.3.2}Design Notation - UML}{44}{subsection.4.3.2}}
\@writefile{toc}{\contentsline {subsection}{\numberline {4.3.3}Detection Approach}{44}{subsection.4.3.3}}
\citation{url2}
\citation{url3}
\citation{treport2}
\@writefile{toc}{\contentsline {section}{\numberline {4.4}Overall Process Description}{45}{section.4.4}}
\@writefile{lof}{\contentsline {figure}{\numberline {4.5}{\ignorespaces Process Diagram}}{45}{figure.4.5}}
\newlabel{fig:fig-process}{{4.5}{45}{Process Diagram\relax }{figure.4.5}{}}
\@writefile{lof}{\contentsline {figure}{\numberline {4.6}{\ignorespaces Descriptive Process Activities }}{47}{figure.4.6}}
\newlabel{fig:fig-overall}{{4.6}{47}{Descriptive Process Activities \relax }{figure.4.6}{}}
\@writefile{toc}{\contentsline {section}{\numberline {4.5}Activity Diagram}{48}{section.4.5}}
\@writefile{toc}{\contentsline {subsection}{\numberline {4.5.1}Detection Activity}{48}{subsection.4.5.1}}
\@writefile{lof}{\contentsline {figure}{\numberline {4.7}{\ignorespaces Detection Activity}}{48}{figure.4.7}}
\newlabel{fig:fig-detection}{{4.7}{48}{Detection Activity\relax }{figure.4.7}{}}
\@writefile{toc}{\contentsline {subsection}{\numberline {4.5.2}Channel Identifier}{49}{subsection.4.5.2}}
\@writefile{lof}{\contentsline {figure}{\numberline {4.8}{\ignorespaces Channel Identification}}{49}{figure.4.8}}
\newlabel{fig:fig-channel}{{4.8}{49}{Channel Identification\relax }{figure.4.8}{}}
\@writefile{toc}{\contentsline {subsection}{\numberline {4.5.3}Scheme Analyzer}{50}{subsection.4.5.3}}
\@writefile{lof}{\contentsline {figure}{\numberline {4.9}{\ignorespaces Scheme Analyzer}}{50}{figure.4.9}}
\newlabel{fig:fig-schemeanalyzer}{{4.9}{50}{Scheme Analyzer\relax }{figure.4.9}{}}
\@writefile{toc}{\contentsline {section}{\numberline {4.6}Components Overview}{51}{section.4.6}}
\@writefile{lof}{\contentsline {figure}{\numberline {4.10}{\ignorespaces Component View }}{51}{figure.4.10}}
\newlabel{fig:fig-component}{{4.10}{51}{Component View \relax }{figure.4.10}{}}
\@writefile{toc}{\contentsline {section}{\numberline {4.7}Database Design}{51}{section.4.7}}
\@writefile{lof}{\contentsline {figure}{\numberline {4.11}{\ignorespaces Schema Diagram }}{52}{figure.4.11}}
\newlabel{fig:fig-schema}{{4.11}{52}{Schema Diagram \relax }{figure.4.11}{}}
\@writefile{toc}{\contentsline {chapter}{\numberline {5}Conclusion and Future work}{53}{chapter.5}}
\@writefile{lof}{\addvspace {10\p@ }}
\@writefile{lot}{\addvspace {10\p@ }}
\bibcite{jour1}{1}
\bibcite{jour2}{2}
\bibcite{ukn}{3}
\bibcite{springer1}{4}
\bibcite{springer2}{5}
\bibcite{springer3}{6}
\bibcite{acm1}{7}
\bibcite{lnotes1}{8}
\bibcite{treport}{9}
\bibcite{treport1}{10}
\bibcite{treport2}{11}
\bibcite{preport}{12}
\bibcite{acm2}{13}
\bibcite{lnotes2}{14}
\bibcite{lnotes3}{15}
\bibcite{lnotes4}{16}
\bibcite{lnotes5}{17}
\bibcite{lnotes6}{18}
\bibcite{sugg}{19}
\bibcite{book1}{20}
\bibcite{book2}{21}
\bibcite{book3}{22}
\bibcite{book4}{23}
\bibcite{book5}{24}
\bibcite{book6}{25}
\bibcite{book7}{26}
\bibcite{book8}{27}
\bibcite{book9}{28}
\bibcite{book10}{29}
\bibcite{book11}{30}
\bibcite{book12}{31}
\bibcite{book13}{32}
\bibcite{manual}{33}
\bibcite{sym}{34}
\bibcite{proceeding1}{35}
\bibcite{proceeding2}{36}
\bibcite{proceeding3}{37}
\bibcite{proceeding4}{38}
\bibcite{URL}{39}
\bibcite{url2}{40}
\bibcite{url3}{41}
\bibcite{url4}{42}
