2017 9th IEEE-GCC Conference and Exhibition (GCCCE) 2017
DOI: 10.1109/ieeegcc.2017.8447997
|View full text |Cite
|
Sign up to set email alerts
|

Network Protocol Covert Channels: Countermeasures Techniques

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 19 publications
(11 citation statements)
references
References 54 publications
0
7
0
Order By: Relevance
“…Here, we explore the latter Most covert channel schemes are designed for the data link layer or higher, using, for example reserved fields, time delays, packet corruptions, etc. [29]- [31].…”
Section: Related Workmentioning
confidence: 99%
“…Here, we explore the latter Most covert channel schemes are designed for the data link layer or higher, using, for example reserved fields, time delays, packet corruptions, etc. [29]- [31].…”
Section: Related Workmentioning
confidence: 99%
“…Moreover, Swaminathan and Vivekanandan [39] stated that; nowadays, the covert communication in WSNs become popular and emerging problem. Interested readers in covert channels are referred to [40][41][42].…”
Section: Layer-based Classificationmentioning
confidence: 99%
“…Recently, Elsadig and Fadlalla summarized some factors that have the most impact on developing covert channels and magnifying their threats [6]. These factors involve:  The advanced development in network technology, the Internet of Things (IoT) which represents a rich area of different scenarios of covert channels, cloud computing, data centers and virtualization techniques  Switching techniques, in which a covert channel can switch itself from one protocol to another or from one field to another in a given protocol or from one network segment to another.…”
Section: Covert Channel Developmentmentioning
confidence: 99%
“…Actually, many methods have been developed to leak conditional information based on network packet-length. Recently, this type of covet channel has received attention due to its undetectable features [5,6].…”
Section: Introductionmentioning
confidence: 99%