DocumentCode :
3286527
Title :
Information theft through covert channel by exploiting HTTP post method
Author :
Tomar, Nishi ; Gaur, M.S.
Author_Institution :
Comput. Eng. Dept., Malaviya Nat. Inst. of Technol., Jaipur, India
fYear :
2013
fDate :
26-28 July 2013
Firstpage :
1
Lastpage :
5
Abstract :
Covert channel is a known vulnerability in most of the network protocols that makes it possible for peers to communicate non-legitimately using known channels. This papers aims at demonstrating information theft scenario by means of covert channel in which it is used as a carrier for transmitting information that is stolen by exploiting HTTP Post method. The paper describes and demonstrates a mechanism of information theft through covert channel exploitation. Some potential countermeasure techniques are suggested on the basis of observed covert channels which is part of our future work.
Keywords :
data encapsulation; telecommunication security; telecommunication traffic; transport protocols; HTTP post method; covert channel; information theft; network protocols; transmitting information; Educational institutions; IP networks; Payloads; Protocols; Receivers; Security; Servers;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Wireless and Optical Communications Networks (WOCN), 2013 Tenth International Conference on
Conference_Location :
Bhopal
ISSN :
2151-7681
Print_ISBN :
978-1-4673-5997-9
Type :
conf
DOI :
10.1109/WOCN.2013.6616180
Filename :
6616180
Link To Document :
بازگشت