Swinburne
Browse
- No file added yet -

A survey of covert channels and countermeasures in computer network protocols

Download (230.41 kB)
journal contribution
posted on 2024-07-11, 10:27 authored by Sebastian Zander, Grenville ArmitageGrenville Armitage, Philip BranchPhilip Branch
Covert channels are used for the secret transfer of information. Encryption only protects communication from being decoded by unauthorised parties, whereas covert channels aim to hide the very existence of the communication. Initially, covert channels were identified as a security threat on monolithic systems i.e. mainframes. More recently focus has shifted towards covert channels in computer network protocols. The huge amount of data and vast number of different protocols in the Internet seems ideal as a high-bandwidth vehicle for covert communication. This article is a survey of the existing techniques for creating covert channels in widely deployed network and application protocols. We also give an overview of common methods for their detection, elimination, and capacity limitation, required to improve security in future computer networks.

History

Available versions

PDF (Published version)

ISSN

1553-877X

Journal title

IEEE Communications Surveys and Tutorials

Volume

9

Issue

3

Pagination

44-57

Publisher

IEEE

Copyright statement

Copyright © 2007 IEEE. The published version is reproduced in accordance with the copyright policy of the publisher. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.

Language

eng

Usage metrics

    Publications

    Categories

    No categories selected

    Keywords

    Exports

    RefWorks
    BibTeX
    Ref. manager
    Endnote
    DataCite
    NLM
    DC