
tween theoretical research and practical network se-
curity applications. This approach lays the foundation
for more robust and adaptive intrusion detection sys-
tems, which are vital to safeguarding IPv6 networks.
2 RELATED WORKS
This section reviews literature on IPv6 covert chan-
nels, covering design methodologies that inspire our
tool CovertGen6 and detection techniques that inform
our integrated approach.
2.1 Covert Channel Designs in IPv6
The design of IPv6 covert channels in Mavani et
al. (Mavani and Ragha, 2014) and Mazurczyk et al.
(Mazurczyk et al., 2019) leverages the flexibility of
IPv6 protocol fields and extension headers to embed
hidden data. Mavani et al. focused on exploiting
the Destination Options Extension Header, a feature
allowing optional processing by destination nodes.
They manipulated this header by embedding covert
data in two ways: (1) defining custom, unrecognized
options (e.g., reserved or vendor-specific codes) that
evade standard validation, and (2) abusing the PadN
option by inserting nonzero padding bytes, which typ-
ically serve alignment purposes but can encode secret
information.
Mazurczyk et al. expanded this scope by evalu-
ating six distinct data-hiding techniques in real-world
IPv6 deployments. Their methods included abusing
fields like the Flow Label, which typically ensures
packet sequencing but can be repurposed to encode
covert bits, and the Traffic Class field for timing-
based steganography. They also exploited extension
headers (e.g., Fragment, Hop-by-Hop) by embed-
ding data in rarely monitored fields or manipulating
fragmentation offsets. For instance, covert channels
were established by altering the Flow Label’s pseudo-
random values to encode messages or embedding data
in unused bits of extension headers.
In practice, such covert channels manifest as
seemingly ordinary IPv6 traffic. For example, a
packet with a Destination Options Extension Header
might appear standard but include a custom option
type (e.g., a proprietary code point) carrying en-
crypted data, or a Flow Label field might exhibit
nonrandom patterns that encode a hidden message.
Mazurczyk et al. emphasized the challenges in detec-
tion, as these channels exploit IPv6’s inherent com-
plexity and the limited scrutiny of newer protocol fea-
tures in security tools. Their work underscores the
need for advanced detection frameworks, such as ma-
chine learning models or protocol-aware wardens, to
identify anomalies in header fields and traffic behav-
ior.
2.2 Detection Approaches
Wang et al. (Wang et al., 2022) introduced CC-Guard,
an IPv6 covert channel detection method based on
field matching. Their approach involves extracting
specific header fields from IPv6 packets and com-
paring them against predefined normal patterns using
a deterministic decision automaton. Although CC-
Guard achieves high detection accuracy by pinpoint-
ing deviations in fields like Traffic Class and Flow La-
bel, the exhaustive pattern matching process results in
a time-consuming analysis that may hinder real-time
applicability.
Danyang Zhao and colleagues (Zhao and Wang,
2020) developed BNS-CNN, a blind network ste-
ganalysis model based on convolutional neural net-
works specifically tailored for IPv6 networks. Their
method involves generating a dataset of 24,000 pack-
ets by embedding covert data into the IPv6 source ad-
dress, Hop Limit field, and TCP ISN. The CNN auto-
matically extracts relevant features from this dataset
to detect covert channels with high accuracy. How-
ever, the dataset’s narrow focus on only a few covert
channel types limits the model’s generalizability to
other types of covert communications.
Arti Dua and co-authors (Dua et al., 2022) pro-
posed DICCh-D, which employs a deep neural net-
work (DNN) to detect IPv6-based covert channels.
Their approach leverages the pcapStego tool (Zup-
pelli and Caviglione, 2021) to generate covert chan-
nels by modifying fields such as Flow Label, Traf-
fic Class, and Hop Limit. While this method demon-
strates the potential of DNNs for efficient detection,
its reliance on pcapStego confines the dataset to only
these specific field modifications, thereby limiting its
ability to detect covert channels exploiting other parts
of the IPv6 header.
This review shows that while early works effec-
tively highlighted various covert channel designs in
IPv6, detection methods have evolved from exhaus-
tive statistical analyses, as seen in CC-Guard, to more
efficient machine learning techniques in DICCh-D.
However, the limited scope of the datasets used in
these machine learning approaches remains a critical
drawback, underscoring the need for frameworks that
can generate a broader range of covert channel sce-
narios and support more robust detection strategies.
Evasive IPv6 Covert Channels: Design, Machine Learning Detection, and Explainable AI Evaluation
667