
Undetectable means the amount of the bits sent should not violate the distribution of the normal packet. Plausibility means the covert channel must be able to exploit the medium in which the packet is in use by the adversary. The property of the stealth of the covert channels is attributed from the anonymity of covert channels as described in, which is subjected to three pillars plausibility, undetectable and indispensability. On the other hand, what makes the covert channels useful is the stealth of the covert channel. Therefore, there is no reason to doubt the capability of the Covert Channels in sending secret messages over the networks.


Moreover, the motivations to use covert channels is supported with the quantity of data that can be transferred through covert channel annually, which can be as huge as 26Gb of data, although the data being transferred is only one bit at a time.8]. Additionally, the volatility of the packet’s leverage is the stealthiest against Steganography without leaving any trail to be audited, because the packets will be destroyed after being used or processed according to defined criteria, which further motivates the use of covert channels.
