DocumentCode :
1224708
Title :
A survey of covert channels and countermeasures in computer network protocols
Author :
Zander, Sebastian ; Armitage, Grenville ; Branch, P.
Volume :
9
Issue :
3
fYear :
2007
Firstpage :
44
Lastpage :
57
Abstract :
Covert channels are used for the secret transfer of information. Encryption only protects communication from being decoded by unauthorised parties, whereas covert channels aim to hide the very existence of the communication. Initially, covert channels were identified as a security threat on monolithic systems i.e. mainframes. More recently focus has shifted towards covert channels in computer network protocols. The huge amount of data and vast number of different protocols in the Internet seems ideal as a high-bandwidth vehicle for covert communication. This article is a survey of the existing techniques for creating covert channels in widely deployed network and application protocols. We also give an overview of common methods for their detection, elimination, and capacity limitation, required to improve security in future computer networks.
Keywords :
Application software; Communication system security; Computer hacking; Computer networks; Cryptography; Data security; Government; Information security; Internet; Protocols;
fLanguage :
English
Journal_Title :
Communications Surveys & Tutorials, IEEE
Publisher :
ieee
ISSN :
1553-877X
Type :
jour
DOI :
10.1109/COMST.2007.4317620
Filename :
4317620
Link To Document :
بازگشت