Network Covert Channels: Review of Current State and Analysis of Viability of the use of X.509 Certificates for Covert Communications

نویسندگان

  • Carlos Scott
  • Royal Holloway
چکیده

ACKNOWLEDGEMENTS Thank you Mum and Dad for paving the road on which I walk, for your unconditional support and infinite love. Thank you Chez and everybody at the ISG for sharing your knowledge and wisdom. Being part of this course truly has been a wonderful experience.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

طراحی و ارزیابی روش کدگذاری ترکیبی برای کانال پوششی زمانبندی‌دار در شبکه اینترنت

Covert channel means communicating information through covering of overt and authorized channel in a manner that existence of channel to be hidden. In network covert timing channels that use timing features of transmission packets to modulating covert information, the appropriate encoding schema is very important. In this paper, a hybrid encoding schema proposed through combining "the inter-pac...

متن کامل

A Review on Covert Timing Channels & their Applications

Covert network timing channels control time between transmissions of packets in overt network communication and transmits hidden messages. This paper presents an overview of different concepts of covert timing channels such as types, features and properties. There is range of terms used for security of information such as encryption, covert channels, network steganography or information hiding ...

متن کامل

Detection And Elimination Of Covert Communication In Transport And Internet Layer – A Survey

Covert channels use stealth communications to compromise the security policies of systems. They constitute an important security threat since they can be used to exfiltrate confidential data from networks. TCP/IP protocols are used everyday and are subject to covert channels problems. Covert channels are used for the secret transfer of information. Encryption only protects communication from be...

متن کامل

CCHEF – Covert Channels Evaluation Framework User Manual Version 0.1

Communication is not necessarily made secure by the use of encryption alone. The mere existence of communication is often enough to raise suspicion and trigger investigative actions. Covert channels aim to hide the very existence of the communication. The huge amount of data and vast number of different protocols in the Internet makes it ideal as a high-bandwidth vehicle for covert communicatio...

متن کامل

Overt and Covert Narcissism in Iranian Students: The Role of Self-esteem and Shame

Objective: For decades, both theory and research have focused on the role of self-esteem and shame in constructing narcissistic traits. However, studies on the exact relationship between these two and overt and covert facets of narcissism have been equivocal.  Methods: The current study is correlational. It examined these relationships among 308 Iranian college students (155 males, 153 femal...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008