Mobility

Using a Novel Blending Method Over Multiple Network Connections for Secure Communication

Free registration required

Executive Summary

In the field of computer security, covert communication is usually seen as adversarial, but from another perspective, it can be seen as a way to communicate securely by hiding data from a malicious third party, e.g., an inside attacker. In this light, instead of making data unreadable using encryption, it may be possible to hide from an adversary a secure network infrastructure (consisting of several node endpoints) in network traffic. Current covert communication techniques, using storage and timing channels, are not suited well for this task. Storage channels typically use properties of a protocol that are ignored, such as unused header fields.

  • Format: PDF
  • Size: 205 KB