This thesis presents the establishment of a covert-channel in wireless networks in the form of frames with intentionally corrupted Frame Check Sequences (FCSs). Previous works had alluded to the possibility of using this kind of covert-channel as an attack vector. We modify a simulation tool, called Sinalgo, which is used as a test bed for generating hypothetical scenarios for establishing a covert-channel. Single and Multi-Agent systems have been proposed as behaviour-based intrusion detection mechanisms, which utilize statistical information about network traffic. This utilized statistical information is used to detect covert-channel communications. This work highlights the potential impact of having this attack perpetrated in communicati...
A network covert channel is a mechanism that can be used to leak information across a network in vio...
The spread of wide-scale Internet surveillance has spurred interest in anonymity systems that protec...
Abstract:- Covert channels and tunneling approaches are becoming a severe threat to information secu...
Since the dawn of human communications, there have been people that have wished to correspond secret...
Many covert channels take advantages of weaknesses, flaws, or unused data fields in network protocol...
Indirect communication channels have been effectively employed in the communications world to bypass...
AbstractWe report on the challenges faced in the implementation and simulation of a side-channel com...
The proposed StegoFrameOrder (SFO) method enables the transmission of covert data in wireless comput...
Transmitting information by hiding it in order to evade detection has been practiced since ancient t...
Covert channels are used for the secret transfer of information. Encryption only protects communicat...
Covert channels are used for the secret transfer of information. Encryption only protects communicat...
AbstractCovert channels are information leaks in systems that use resources to transfer secretly a m...
A covert channel is a communication method that misuses legitimate resources to bypass intrusion det...
Covert channels is a vital setup in the analysing the strength of security in a network. Covert Chan...
Communication is not necessarily made se- cure by the use of encryption alone. The mere existence of...
A network covert channel is a mechanism that can be used to leak information across a network in vio...
The spread of wide-scale Internet surveillance has spurred interest in anonymity systems that protec...
Abstract:- Covert channels and tunneling approaches are becoming a severe threat to information secu...
Since the dawn of human communications, there have been people that have wished to correspond secret...
Many covert channels take advantages of weaknesses, flaws, or unused data fields in network protocol...
Indirect communication channels have been effectively employed in the communications world to bypass...
AbstractWe report on the challenges faced in the implementation and simulation of a side-channel com...
The proposed StegoFrameOrder (SFO) method enables the transmission of covert data in wireless comput...
Transmitting information by hiding it in order to evade detection has been practiced since ancient t...
Covert channels are used for the secret transfer of information. Encryption only protects communicat...
Covert channels are used for the secret transfer of information. Encryption only protects communicat...
AbstractCovert channels are information leaks in systems that use resources to transfer secretly a m...
A covert channel is a communication method that misuses legitimate resources to bypass intrusion det...
Covert channels is a vital setup in the analysing the strength of security in a network. Covert Chan...
Communication is not necessarily made se- cure by the use of encryption alone. The mere existence of...
A network covert channel is a mechanism that can be used to leak information across a network in vio...
The spread of wide-scale Internet surveillance has spurred interest in anonymity systems that protec...
Abstract:- Covert channels and tunneling approaches are becoming a severe threat to information secu...