Covert channels in TCP/IP: attack and defence