Covert channel technique based on streaming protocol
نویسندگان
چکیده
منابع مشابه
Covert Channel in the BitTorrent Tracker Protocol
Covert channels have the unique quality of masking evidence that a communication has ever occurred between two parties. For spies and terrorist cells, this quality can be the difference between life and death. However, even the detection of communications in a botnet could be troublesome for its creators. To evade detection and prevent insights into the size and members of a botnet, covert chan...
متن کاملProtoLeaks: A Reliable and Protocol-Independent Network Covert Channel
We propose a theoretical framework for a network covert channel based on enumerative combinatorics. It offers protocol independence and avoids detection by using a mimicry defense. Using a network monitoring phase, traffic is analyzed to detect which application-layer protocols are allowed through the firewalls. Using these results, a covert channel is built based on permutations of benign netw...
متن کاملSkyLen: a Skype-based length covert channel
Network covert channel is a technology that transfers information secretly through the computer network. The length-based covert channel is one of the most popular covert channels. Most of the existing length-based schemes are vulnerable to detections due to the abnormal statistical features of the covert traffic. In this paper, a Skype-based length covert channel SkyLen is proposed. The propos...
متن کاملCovert Channel Detection and Analysis System Based on Data Mining
Covert channels and tunneling approaches are becoming a severe threat to information security. Penetration tools are employed to transit sensitive information through authorized streams. Since many current solutions are based on expert’s experiences or latter-wit, a self-learning detection and analysis system is starved for. A data mining framework for Covert Channel Detection and Analysis Syst...
متن کاملA Covert Channel Based on Web Read-time Modulation
A network covert channel is created that operates by modulating the time between web resource accesses, with an “average web user” read-time used as a reference. While the covert channel may be classified as timing based, it does not operate by changing deterministic protocol attributes such as inter-packet delay, as do most timing based network covert channels. Instead, our channel communicate...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Scientific and Technical Journal of Information Technologies, Mechanics and Optics
سال: 2018
ISSN: 2226-1494
DOI: 10.17586/2226-1494-2018-18-5-834-842