Provided by: Academic Hosting & Event Management Solutions
Date Added: May 2013
Covert channels leaks information where information travels unnoticed i.e. the communication itself is hidden. Encryption used to protect the communication from being decoded by unauthorized users. But covert channels hide the existence of communication. Covert channels are serious security threat. There are many existing techniques available for development of covert channels by manipulating certain fields in the network protocols such as HTTP, IP, TCP, etc. The available packet length based covert channels are having tamper resistance capability but due to abnormal traffic distribution results in detection possibility.