In the field of computer security, covert communication is usually seen as adversarial, but from another perspective, it can be seen as a way to communicate securely by hiding data from a malicious third party, e.g., an inside attacker. In this light, instead of making data unreadable using encryption, it may be possible to hide from an adversary a secure network infrastructure (consisting of several node endpoints) in network traffic. In this paper we describe a novel blending technique that is capable of using as carriers the payload fields of multiple connections including audio, video, and voice over IP (VoIP) streams. The technique executes in three main phases. First the state of the network is analyzed. Next, insertion points are sel...
Network covert channels are policy-breaking and stealthy communication channels in computer networks...
Covert communication is a rapidly expanding field of research with significant impact on the securit...
Network Steganography describes all the methods used for transmitting data over a network without it...
Information hiding is increasingly used to implement covert channels, to exfiltrate data or to perfo...
Covert channels are used for the secret transfer of information. Encryption only protects communicat...
Covert channels are used for the secret transfer of information. Encryption only protects communicat...
Covert channels are used for the secret transfer of information. Encryption only protects communicat...
network attacker wants to transmit VoIP traffic streams covertly. He tries to evade the detection sy...
network attacker wants to transmit VoIP traffic streams covertly. He tries to evade the detection sy...
network attacker wants to transmit VoIP traffic streams covertly. He tries to evade the detection sy...
network attacker wants to transmit VoIP traffic streams covertly. He tries to evade the detection sy...
This paper presents a covert communication channel that exists in virtually all forms of packet swit...
Indirect communication channels have been effectively employed in the communications world to bypass...
A network attacker wants to transmit Voice-over-IP (VoIP) traffic streams covertly. He tries to evad...
Encryption alone secures communication by preventing adversaries from easily decoding one’s transmis...
Network covert channels are policy-breaking and stealthy communication channels in computer networks...
Covert communication is a rapidly expanding field of research with significant impact on the securit...
Network Steganography describes all the methods used for transmitting data over a network without it...
Information hiding is increasingly used to implement covert channels, to exfiltrate data or to perfo...
Covert channels are used for the secret transfer of information. Encryption only protects communicat...
Covert channels are used for the secret transfer of information. Encryption only protects communicat...
Covert channels are used for the secret transfer of information. Encryption only protects communicat...
network attacker wants to transmit VoIP traffic streams covertly. He tries to evade the detection sy...
network attacker wants to transmit VoIP traffic streams covertly. He tries to evade the detection sy...
network attacker wants to transmit VoIP traffic streams covertly. He tries to evade the detection sy...
network attacker wants to transmit VoIP traffic streams covertly. He tries to evade the detection sy...
This paper presents a covert communication channel that exists in virtually all forms of packet swit...
Indirect communication channels have been effectively employed in the communications world to bypass...
A network attacker wants to transmit Voice-over-IP (VoIP) traffic streams covertly. He tries to evad...
Encryption alone secures communication by preventing adversaries from easily decoding one’s transmis...
Network covert channels are policy-breaking and stealthy communication channels in computer networks...
Covert communication is a rapidly expanding field of research with significant impact on the securit...
Network Steganography describes all the methods used for transmitting data over a network without it...