نتایج جستجو برای: covert channel

تعداد نتایج: 228225  

Journal: :Journal of Computer Virology and Hacking Techniques 2016

Journal: :RAIRO - Theoretical Informatics and Applications 2010

Journal: :First Monday 1997
David Llamas Alan Miller Colin Allison

Information hiding techniques can be used by criminals and terrorists to communicate over covert channels within the TCP/IP protocol suite and can be used to overcome firewalls and most other forms of network intrusion detection and prevention systems. In this work we describe the covert channel concept and weaknesses in the five layered TCP/IP layered model. We then present an evaluation frame...

Journal: :Scientific and Technical Journal of Information Technologies, Mechanics and Optics 2018

Journal: :Electronics 2023

The paper presents a method of creating hidden channel using signals’ superposition. According to this idea, transmitter simultaneously sends overt and covert (secret) signals, whereby the signal is carrier for one. Due need ensure low probability detection communication, should have power. This implies number problems relating its correct reception. similar non-orthogonal multiple access (NOMA...

2010
Loïc Hélouët Aline Roumy

This paper presents an information theory based detection framework for covert channels. We first show that the usual notion of interference does not characterize the notion of deliberate information flow of covert channels. We then show that even an enhanced notion of “iterated multivalued interference” can not capture flows with capacity lower than one bit of information per channel use. We t...

2011
Seyed Ali Ahmadzadeh

Covert communication refers to the process of communicating data through a channel that is neither designed, nor intended to transfer information. Traditionally, covert channels are considered as security threats in computer systems and a great deal of attention has been given to countermeasures for covert communication schemes. The evolution of computer networks led the communication community...

2017
K. Kogos A. Sokolov

Covert channels are used for information transmission in a manner that is not intended for communication and is difficult to detect. We propose a technique to prevent the information leakage via IP covert timing channels by inter-packet delays normalization in the process of packets sending. Recommendations for using the counteraction methods and choosing parameters were given. The advantage of...

2007
Janne Lindqvist

In recent years, covert channel techniques for IPv4 and more recently for IPv6 have been published by the scientific community and also presented in DEFCON 14. However, a covert channel that contains a considerable bandwidth has been overlooked, the autoconfigured IPv6 address itself. IPv6 Stateless Address Autoconfiguration is used for autoconfiguring addresses without a server in IPv6 network...

2010
Yousra Alkabani Negar Kiyavash Farinaz Koushanfar

This paper presents the design and implementation of spyware communication circuits built into the widely used Carrier Sense Multiple Access with collision avoidance (CSMA/CA) protocol. The spyware components are embedded within the sequential and combinational communication circuit structure during synthesis, rendering the distinction or dissociation of the spyware from the original circuit im...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید