• DocumentCode
    2365338
  • Title

    The Research on the Principle of Covert Communication and Defense Strategy Based on Sniffer

  • Author

    Zhang, Shufen ; Chen, Xuebin ; Zhang, Shuai ; Yan, Hongcan

  • Author_Institution
    Hebei Polytech. Univ., Tangshan, China
  • fYear
    2009
  • fDate
    25-27 Aug. 2009
  • Firstpage
    349
  • Lastpage
    352
  • Abstract
    It is well known that Internet is the largest network covering the whole world. The open protocol of the internet helps the development of the computer network. But the security was neglected in the earlier design of Internet protocol, at the same time the management of Internet was not belonged to the government. All these result in the threats to the Internet. Accidents related to security happen all the time. Information technology is a double-edged sword. When it brings virtues to us, it brings risks to us. The covert technology is a common technology used by hacker, including invasion behavior covert technology, illegal advancement covert technology and hiding communication and so on. The hiding communication is often used in wooden horse or other back door. This article introduces the principle of hiding communication based on Sniffer, gives an example on this technology, and puts forward an effective method in detecting and preventing.
  • Keywords
    Internet; authorisation; telecommunication security; Internet; Sniffer; covert communication; hiding communication; illegal advancement covert technology; invasion behavior covert technology; Accidents; Communications technology; Computer hacking; Computer network management; Government; IP networks; Information security; Information technology; Internet; Protocols; Covert Channel; Covert communication; Sniffer;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    INC, IMS and IDC, 2009. NCM '09. Fifth International Joint Conference on
  • Conference_Location
    Seoul
  • Print_ISBN
    978-1-4244-5209-5
  • Electronic_ISBN
    978-0-7695-3769-6
  • Type

    conf

  • DOI
    10.1109/NCM.2009.316
  • Filename
    5331699