Capacity Boost with Data Security in Network Protocol Covert Channel

Covert channels leaks information where information travels unnoticed i.e. the communication itself is hidden. Encryption used to protect the communication from being decoded by unauthorized users. But covert channels hide the existence of communication. Covert channels are serious security threat. There are many existing techniques available for development of covert channels by manipulating certain fields in the network protocols such as HTTP, IP, TCP, etc. The available packet length based covert channels are having tamper resistance capability but due to abnormal traffic distribution results in detection possibility.

Provided by: Academic Hosting & Event Management Solutions Topic: Security Date Added: May 2013 Format: PDF

Find By Topic