Covert Channels in Internet Protocols: A Survey

作者: C Allison , A Miller , D Llamas

DOI:

关键词:

摘要: The creation of covert channels in public computer networks can prove an effective means information hiding and secret communication. With the widespread adoption Internet TCP/IP suite protocols have become pervasive, therefore attractive target for channel exploitation. This paper gives a brief overview communication networks, presents survey some recent relevant papers on use common protocols.

参考文章(10)
Abhishek Singh, Ola Nordström, Chenghuai Lu, Andre L. M. dos Santos, Malicious ICMP tunneling: defense against the vulnerability australasian conference on information security and privacy. pp. 226- 236 ,(2003) , 10.1007/3-540-45067-X_20
John Giffin, Rachel Greenstadt, Peter Litwack, Richard Tibbetts, Covert messaging through TCP timestamps privacy enhancing technologies. pp. 194- 208 ,(2002) , 10.1007/3-540-36467-6_15
Steven B. Lipner, A comment on the confinement problem ACM SIGOPS Operating Systems Review. ,vol. 9, pp. 192- 196 ,(1975) , 10.1145/1067629.806537
Craig H. Rowland, Covert channels in the TCP/IP protocol suite First Monday. ,vol. 2, ,(1997) , 10.5210/FM.V2I5.528
Butler W. Lampson, A note on the confinement problem Communications of the ACM. ,vol. 16, pp. 613- 615 ,(1973) , 10.1145/362375.362389
Serdar Cabuk, Carla E. Brodley, Clay Shields, IP covert timing channels: design and detection computer and communications security. pp. 178- 187 ,(2004) , 10.1145/1030083.1030108
Steven J. Murdoch, Stephen Lewis, Embedding Covert Channels into TCP/IP Information Hiding. pp. 247- 261 ,(2005) , 10.1007/11558859_19
I.S. Moskowitz, M.H. Kang, Covert channels-here to stay? Proceedings of COMPASS'94 - 1994 IEEE 9th Annual Conference on Computer Assurance. pp. 235- 243 ,(1994) , 10.1109/CMPASS.1994.318449