\contentsline {chapter}{\numberline {1}Introduction}{2}{chapter.1}
\contentsline {section}{\numberline {1.1}Covert Channel Terminology}{3}{section.1.1}
\contentsline {section}{\numberline {1.2}Motivation and Importance}{6}{section.1.2}
\contentsline {section}{\numberline {1.3}Scope}{7}{section.1.3}
\contentsline {section}{\numberline {1.4}Objective}{7}{section.1.4}
\contentsline {section}{\numberline {1.5}Document Conventions}{8}{section.1.5}
\contentsline {section}{\numberline {1.6}Intended Audience and Reading Suggestion}{8}{section.1.6}
\contentsline {chapter}{\numberline {2}Literature Survey}{9}{chapter.2}
\contentsline {section}{\numberline {2.1}Importance of Covertness and Layers of Attack}{10}{section.2.1}
\contentsline {section}{\numberline {2.2}Covert Channel Classification}{11}{section.2.2}
\contentsline {subsection}{\numberline {2.2.1}Prisoner's Problem}{18}{subsection.2.2.1}
\contentsline {section}{\numberline {2.3}Practical Implementation of Transport Layer Based Hybrid Covert Channel}{19}{section.2.3}
\contentsline {subsection}{\numberline {2.3.1}NCT - SNCC Implementation}{20}{subsection.2.3.1}
\contentsline {subsection}{\numberline {2.3.2}SCSL Implementation}{22}{subsection.2.3.2}
\contentsline {chapter}{\numberline {3}Software Requirement Specification}{26}{chapter.3}
\contentsline {section}{\numberline {3.1}System Description}{26}{section.3.1}
\contentsline {section}{\numberline {3.2}Product Perspective}{26}{section.3.2}
\contentsline {section}{\numberline {3.3}Assumptions, Constraints and Dependencies}{26}{section.3.3}
\contentsline {section}{\numberline {3.4}External Interface Requirements}{27}{section.3.4}
\contentsline {subsection}{\numberline {3.4.1}Hardware Interface}{27}{subsection.3.4.1}
\contentsline {subsection}{\numberline {3.4.2}Software Interface}{28}{subsection.3.4.2}
\contentsline {subsection}{\numberline {3.4.3}Communication Interface}{28}{subsection.3.4.3}
\contentsline {subsection}{\numberline {3.4.4}User Interface}{28}{subsection.3.4.4}
\contentsline {section}{\numberline {3.5}Functional Requirement}{28}{section.3.5}
\contentsline {subsection}{\numberline {3.5.1}Hybrid Covert Channel in noisy legitimate communication}{30}{subsection.3.5.1}
\contentsline {subsection}{\numberline {3.5.2}Component Covert Channel in Transport Layer (TCP)}{31}{subsection.3.5.2}
\contentsline {subsection}{\numberline {3.5.3}Component Subliminal Channel in Secured Socket Layer (SSL)}{32}{subsection.3.5.3}
\contentsline {subsection}{\numberline {3.5.4}Detection of Hybrid Covert Channel}{33}{subsection.3.5.4}
\contentsline {subsection}{\numberline {3.5.5}Elimination of Hybrid Covert Channel}{34}{subsection.3.5.5}
\contentsline {subsection}{\numberline {3.5.6}Broadcast Event}{35}{subsection.3.5.6}
\contentsline {section}{\numberline {3.6}Non-Functional Requirement}{36}{section.3.6}
\contentsline {subsection}{\numberline {3.6.1}Performance Requirements}{36}{subsection.3.6.1}
\contentsline {subsection}{\numberline {3.6.2}Safety Requirement}{36}{subsection.3.6.2}
\contentsline {subsection}{\numberline {3.6.3}Business Rules}{36}{subsection.3.6.3}
\contentsline {subsection}{\numberline {3.6.4}Security}{37}{subsection.3.6.4}
\contentsline {chapter}{\numberline {4}Software Detailed Design}{38}{chapter.4}
\contentsline {section}{\numberline {4.1}System Organization}{38}{section.4.1}
\contentsline {section}{\numberline {4.2}Architectural Design}{39}{section.4.2}
\contentsline {section}{\numberline {4.3}Design Methodology}{41}{section.4.3}
\contentsline {subsection}{\numberline {4.3.1}Component Based Software Engineering (CBSE)}{41}{subsection.4.3.1}
\contentsline {subsection}{\numberline {4.3.2}Design Notation - UML}{44}{subsection.4.3.2}
\contentsline {subsection}{\numberline {4.3.3}Detection Approach}{44}{subsection.4.3.3}
\contentsline {section}{\numberline {4.4}Overall Process Description}{45}{section.4.4}
\contentsline {section}{\numberline {4.5}Activity Diagram}{48}{section.4.5}
\contentsline {subsection}{\numberline {4.5.1}Detection Activity}{48}{subsection.4.5.1}
\contentsline {subsection}{\numberline {4.5.2}Channel Identifier}{49}{subsection.4.5.2}
\contentsline {subsection}{\numberline {4.5.3}Scheme Analyzer}{50}{subsection.4.5.3}
\contentsline {section}{\numberline {4.6}Components Overview}{51}{section.4.6}
\contentsline {section}{\numberline {4.7}Database Design}{51}{section.4.7}
\contentsline {chapter}{\numberline {5}Conclusion and Future work}{53}{chapter.5}
