2019
DOI: 10.1016/j.future.2018.12.047
|View full text |Cite
|
Sign up to set email alerts
|

Countering adaptive network covert communication with dynamic wardens

Abstract: HAL is a multidisciplinary open access archive for the deposit and dissemination of scientific research documents, whether they are published or not. The documents may come from teaching and research institutions in France or abroad, or from public or private research centers. L'archive ouverte pluridisciplinaire HAL, est destinée au dépôt et à la diffusion de documents scientifiques de niveau recherche, publiés ou non, émanant des établissements d'enseignement et de recherche français ou étrangers, des labora… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
14
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
2
1

Relationship

3
4

Authors

Journals

citations
Cited by 22 publications
(14 citation statements)
references
References 31 publications
0
14
0
Order By: Relevance
“…According to [15], different wardens exist and they can be classified by considering the type of information they use to detect the covert channel as well as their structure. Literature sill not agree on a unique taxonomy, but three main traits can be used to describe middleboxes and techniques for detecting hidden communication attempts exploiting network artifacts:…”
Section: Development Of Countermeasuresmentioning
confidence: 99%
“…According to [15], different wardens exist and they can be classified by considering the type of information they use to detect the covert channel as well as their structure. Literature sill not agree on a unique taxonomy, but three main traits can be used to describe middleboxes and techniques for detecting hidden communication attempts exploiting network artifacts:…”
Section: Development Of Countermeasuresmentioning
confidence: 99%
“…From the countermeasure's perspective, defending a network from covert channels is typically achieved by using wardens [13], [14]. A warden is a single node in a network that intends to unveil, limit, or eliminate any hidden communications [12], [15]. Clearly, in an ideal case, the primary objective of the warden is to detect the existence of NCCs.…”
Section: Fundamentals and Related Workmentioning
confidence: 99%
“…The attacker then uses NCC to exfiltrate confidential data to his external server (CR). To achieve this, CS and CR use the concept of the adaptive covert communication as defined in [12].…”
Section: A Threat Modelmentioning
confidence: 99%
See 2 more Smart Citations