Sensors, and Command, Control, Communications, and Intelligence (C3I) Technologies for Homeland Security and Homeland Defense V 2006
DOI: 10.1117/12.670123
|View full text |Cite
|
Sign up to set email alerts
|

Data exfiltration and covert channels

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
30
0

Year Published

2011
2011
2023
2023

Publication Types

Select...
5
3
1

Relationship

1
8

Authors

Journals

citations
Cited by 46 publications
(30 citation statements)
references
References 4 publications
0
30
0
Order By: Relevance
“…In [5], it is shown how data can be exfiltrated by embedding sensitive information in conventional browser HTTP requests. In [6], the authors study exfiltration through covert channels. For instance, the rate of sending packets to a destination can be tuned such that the frequency or inter-arrival time of packets corresponds to an encoding of the data.…”
Section: Related Workmentioning
confidence: 99%
“…In [5], it is shown how data can be exfiltrated by embedding sensitive information in conventional browser HTTP requests. In [6], the authors study exfiltration through covert channels. For instance, the rate of sending packets to a destination can be tuned such that the frequency or inter-arrival time of packets corresponds to an encoding of the data.…”
Section: Related Workmentioning
confidence: 99%
“…The following discussion shows how a timing covert channel can be constructed based on a beacon and argues that a naive encoding of covert messages based on packet inter-arrival times produces a clearly detectable distortion of the 1-order statistics of those time intervals in network traffic [39], [16]. We emphasize that this timing channel is merely an example and in no way meant to limit the applicability of these techniques.…”
Section: Background and Illustrative Examplesmentioning
confidence: 99%
“…Giani et al [21] state in 'Data Exfiltration and Covert Channels': "While any comprehensive taxonomy of widelydiverse and overlapping members is bound to be subject to debate, we feel that this approach will be helpful to identifying abstractions of pathologies and weaknesses that are common to many methods. And this will allow a systematic development of defences and countermeasures independently of a specific platform or context in which specific exfiltration phenomena take place."…”
Section: ) Data Exfiltrationmentioning
confidence: 99%