Covert channels are communication channels that can be exploited by a process to transfer information in a manner that violates the systems security policy [Abdulla, 2002; Proctor and Neumann, 1992]. They attempt to hide the data a covert user is communicating and the fact that someone is communicating. Thus actual data transfer must look legitimate or innocuous to the casual eye and may or may not include encryption to scramble data. Covert channels are used by crackers who have breached an organisation's systems to download tools from outside, upload internal data to outside, create virtual network to outside machines and communicate to outside paths. They are also used by internal users who want to use forbidden protocols, who want to ha...
Network covert channels are policy-breaking and stealthy communication channels in computer networks...
Includes bibliographical references (pages 29-30).Covert channels encompass a group of methods desig...
Computer network is unpredictable due to information warfareand is prone to various attacks. Such at...
Covert channels are used for the secret transfer of information. Encryption only protects communicat...
Covert channels are used for the secret transfer of information. Encryption only protects communicat...
Covert channels are used for the secret transfer of information. Encryption only protects communicat...
The popularity of computer-based smuggling has increased as a result of organizations taking measur...
Network Steganography describes all the methods used for transmitting data over a network without it...
Network Steganography describes all the methods used for transmitting data over a network without it...
In order to protect user privacy or guarantee free access to the Internet, the network covert channe...
Covert communication is a rapidly expanding field of research with significant impact on the securit...
Computer network is unpredictable due to information warfare and is prone to various attacks. Such a...
Steganography is one of the major techniques used to hide the existence of communication that lies b...
This paper presents a covert communication channel that exists in virtually all forms of packet swit...
Covert channel techniques are used by attackers to transfer hidden data. There are two main categori...
Network covert channels are policy-breaking and stealthy communication channels in computer networks...
Includes bibliographical references (pages 29-30).Covert channels encompass a group of methods desig...
Computer network is unpredictable due to information warfareand is prone to various attacks. Such at...
Covert channels are used for the secret transfer of information. Encryption only protects communicat...
Covert channels are used for the secret transfer of information. Encryption only protects communicat...
Covert channels are used for the secret transfer of information. Encryption only protects communicat...
The popularity of computer-based smuggling has increased as a result of organizations taking measur...
Network Steganography describes all the methods used for transmitting data over a network without it...
Network Steganography describes all the methods used for transmitting data over a network without it...
In order to protect user privacy or guarantee free access to the Internet, the network covert channe...
Covert communication is a rapidly expanding field of research with significant impact on the securit...
Computer network is unpredictable due to information warfare and is prone to various attacks. Such a...
Steganography is one of the major techniques used to hide the existence of communication that lies b...
This paper presents a covert communication channel that exists in virtually all forms of packet swit...
Covert channel techniques are used by attackers to transfer hidden data. There are two main categori...
Network covert channels are policy-breaking and stealthy communication channels in computer networks...
Includes bibliographical references (pages 29-30).Covert channels encompass a group of methods desig...
Computer network is unpredictable due to information warfareand is prone to various attacks. Such at...