A kind of covert channels was found in using FTP command parameters. And we studied such a covert channel, which utilizes the PORT command’s parameters. The covert channel’s three characters, which are concealment, bandwidth and robustness, are studied based on the analysis of the covert channel’s principles. And the four covert communication working conditions are proposed and studied. Some kinds of covert channel obstructing methods are proposed to solve the sensitive information leaking problem.
展开▼