2022
DOI: 10.1109/access.2022.3168018
|View full text |Cite
|
Sign up to set email alerts
|

Analysis of Reversible Network Covert Channels

Abstract: In the last years, the utilization of information hiding techniques for empowering modern strains of malware has become a serious concern for security experts. Such an approach allows attackers to act in a stealthy manner, for instance, to covertly exfiltrate confidential data or retrieve additional command & control payloads for the operation of malware. Therefore, the deep understanding of data hiding mechanisms is a core requirement, as it allows designing effective countermeasures. Unfortunately, the most … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
2
2
2

Relationship

1
5

Authors

Journals

citations
Cited by 6 publications
(1 citation statement)
references
References 42 publications
0
1
0
Order By: Relevance
“…No Consideration of reversibility and indirect hiding methods: As previous taxonomies, we did not cover the aspect of reversibility for hiding patterns. While some works have already analyzed reversibility for digital media steganography [174]- [176] as well as for network steganography [177], [178], we leave such a large analysis for future work as it requires excessive experimental evaluations which are not within the scope of a survey paper. Similarly, we do not present patterns or discussions on indirect hiding methods as a recent paper already provides a survey on these [16].…”
Section: B Limitationsmentioning
confidence: 99%
“…No Consideration of reversibility and indirect hiding methods: As previous taxonomies, we did not cover the aspect of reversibility for hiding patterns. While some works have already analyzed reversibility for digital media steganography [174]- [176] as well as for network steganography [177], [178], we leave such a large analysis for future work as it requires excessive experimental evaluations which are not within the scope of a survey paper. Similarly, we do not present patterns or discussions on indirect hiding methods as a recent paper already provides a survey on these [16].…”
Section: B Limitationsmentioning
confidence: 99%