DocumentCode :
999549
Title :
Covert channels and countermeasures in computer network protocols [Reprinted from IEEE Communications Surveys and Tutorials]
Author :
Zander, Ebastian ; Armitage, Grenville ; Branch, Philip
Author_Institution :
Univ. of Technol. Melbourne, Melbourne
Volume :
45
Issue :
12
fYear :
2007
fDate :
12/1/2007 12:00:00 AM
Firstpage :
136
Lastpage :
142
Abstract :
Covert channels are used for the secret transfer of information. Encryption only protects communication from being decoded by unauthorized parties, whereas covert channels aim to hide the very existence of the communication. Initially, covert channels were identified as a security threat on monolithic systems such as mainframes. More recently, focus has shifted toward covert channels in computer network protocols. The huge amount of data and large number of different protocols in the Internet is ideal as a high-bandwidth vehicle for covert communication. This article provides an overview of the existing techniques for creating covert channels in widely deployed network protocols, and common methods for their detection, elimination, and capacity limitation.
Keywords :
Internet; computer networks; cryptography; protocols; Internet; computer network protocols; countermeasures; covert channels; encryption; high-bandwidth vehicle; monolithic systems; secret information ransfer; security threat; Computer hacking; Computer networks; Cryptography; Internet; Protocols; Receivers; Tutorials;
fLanguage :
English
Journal_Title :
Communications Magazine, IEEE
Publisher :
ieee
ISSN :
0163-6804
Type :
jour
DOI :
10.1109/MCOM.2007.4395378
Filename :
4395378
Link To Document :
بازگشت