Network covert channels are used to hide communication inside network protocols. Various techniques for covert channels have arisen in the past few decades. We surveyed and analyzed 109 techniques developed between 1987 and 2013 and show that these techniques can be reduced to only 11 different patterns. Moreover, the majority (69.7%) of techniques can be categorized into only four different patterns (i.e., most techniques we surveyed are similar). We represent the patterns in a hierarchical catalog using a pattern language. Our pattern catalog will serve as a base for future covert channel novelty evaluation. Furthermore, we apply the concept of pattern variations to network covert channels. With pattern variations, the context of a patter...
Computer network is unpredictable due to information warfare and is prone to various attacks. Such a...
Within the last years, new techniques for network covert channels arose, such as covert channel over...
Keywords: Covert channels in IP networks are investigated. The possibilities adversary needs to cons...
Network covert channels are used to hide communication inside network protocols. Various techniques ...
Network covert channels are used to hide communication inside network protocols. Various techniques ...
Network covert channels are used to hide communication inside network protocols. Within the last dec...
Network covert channels enable stealthy communications for malware and data exfiltration. For this r...
Covert channels are used for the secret transfer of information. Encryption only protects communicat...
Within the last few years, indirect network-level covert channels have experienced a renaissance wit...
In network information hiding, hiding patterns are used to describe hiding methods and their taxonom...
Covert channels are used for the secret transfer of information. Encryption only protects communicat...
Since the dawn of human communications, there have been people that have wished to correspond secret...
The aim of this paper is to describe the created method for identifying network covert channels. Tra...
Network covert channels are policy-breaking and stealthy communication channels in computer networks...
In order to protect user privacy or guarantee free access to the Internet, the network covert channe...
Computer network is unpredictable due to information warfare and is prone to various attacks. Such a...
Within the last years, new techniques for network covert channels arose, such as covert channel over...
Keywords: Covert channels in IP networks are investigated. The possibilities adversary needs to cons...
Network covert channels are used to hide communication inside network protocols. Various techniques ...
Network covert channels are used to hide communication inside network protocols. Various techniques ...
Network covert channels are used to hide communication inside network protocols. Within the last dec...
Network covert channels enable stealthy communications for malware and data exfiltration. For this r...
Covert channels are used for the secret transfer of information. Encryption only protects communicat...
Within the last few years, indirect network-level covert channels have experienced a renaissance wit...
In network information hiding, hiding patterns are used to describe hiding methods and their taxonom...
Covert channels are used for the secret transfer of information. Encryption only protects communicat...
Since the dawn of human communications, there have been people that have wished to correspond secret...
The aim of this paper is to describe the created method for identifying network covert channels. Tra...
Network covert channels are policy-breaking and stealthy communication channels in computer networks...
In order to protect user privacy or guarantee free access to the Internet, the network covert channe...
Computer network is unpredictable due to information warfare and is prone to various attacks. Such a...
Within the last years, new techniques for network covert channels arose, such as covert channel over...
Keywords: Covert channels in IP networks are investigated. The possibilities adversary needs to cons...