Covert Channels are communication channels used for information transfer, and created by violating the security policies of a system (Latham, 1986, p. 80). Research in the field has shown that, like many communication channels, IPv4 and the TCP/IP protocol suite has features, functionality and options which could be exploited by cyber criminals to leak data or for anonymous communications, through covert channels. With the advent of IPv6, researchers are on the lookout for covert channels in IPv6 and one of them demonstrated a proof of concept in 2006. Nine years hence, IPv6 and its related protocols have undergone major changes, which introduced a need to reevaluate the current situation of IPv6. The current research is a continuation of o...
Security network systems have been an increasingly important discipline since the implementation of ...
There is a risk whenever we use networks, computer systems and Internet technologies that things wil...
One of the most important techniques in data hiding is (Metaferography) covert channel, which recent...
Covert Channels are communication channels used for information transfer, and created by violating t...
Covert channels are any communication channel that can be exploited to transfer information in a man...
IPv4 is the historical addressing protocol used for all devices connected worldwide. It has survived...
The Internet Protocol (IP) defines the format by which packets are relayed throughout and across net...
Modern malware increasingly exploits information hiding to re- main undetected while attacking. To t...
Steganography is the process to hide a secret message such that it is very difficult to detect the p...
Malware is software which was invented and meant for doing harms on computers. Malware is becoming a...
Malware is software which was invented and meant for doing harms on computers. Malware is becoming a...
A computer network is considered forensically ready, when crucial evidence for a forensic investigat...
Keywords: Covert channels in IP networks are investigated. The possibilities adversary needs to cons...
Zero day Cyber-attacks created potential impacts on the way information is held and protected, howev...
Intrusion detection systems offer monolithic way to detect attacks through monitoring, searching fo...
Security network systems have been an increasingly important discipline since the implementation of ...
There is a risk whenever we use networks, computer systems and Internet technologies that things wil...
One of the most important techniques in data hiding is (Metaferography) covert channel, which recent...
Covert Channels are communication channels used for information transfer, and created by violating t...
Covert channels are any communication channel that can be exploited to transfer information in a man...
IPv4 is the historical addressing protocol used for all devices connected worldwide. It has survived...
The Internet Protocol (IP) defines the format by which packets are relayed throughout and across net...
Modern malware increasingly exploits information hiding to re- main undetected while attacking. To t...
Steganography is the process to hide a secret message such that it is very difficult to detect the p...
Malware is software which was invented and meant for doing harms on computers. Malware is becoming a...
Malware is software which was invented and meant for doing harms on computers. Malware is becoming a...
A computer network is considered forensically ready, when crucial evidence for a forensic investigat...
Keywords: Covert channels in IP networks are investigated. The possibilities adversary needs to cons...
Zero day Cyber-attacks created potential impacts on the way information is held and protected, howev...
Intrusion detection systems offer monolithic way to detect attacks through monitoring, searching fo...
Security network systems have been an increasingly important discipline since the implementation of ...
There is a risk whenever we use networks, computer systems and Internet technologies that things wil...
One of the most important techniques in data hiding is (Metaferography) covert channel, which recent...