Javascript must be enabled to continue!
Network Covert Channels
View through CrossRef
With the rapid advancement of communication and computer network technologies, covert channels are now more secure, quicker to set up, harder to detect, and easier to design than ever before. By breaking a system security policy, a covert channel can be utilized to leak confidential communications. Undoubtedly, one of the most difficult challenges is still detecting such harmful, unobservable, and covert dangers. Due to the fact that this danger takes advantage of techniques not intended for communication, it is invisible to conventional security solutions. This chapter offers a concise overview of covert channel concept, techniques, classifications, and countermeasures, emphasizing how new technologies are vulnerable to being exploited for initiation of different covert channels and how they offer a rich environment for developing effective but challenging covert channel attacks. It gives a comprehensive review of common covert channel countermeasures with more focus on machine learning detection techniques. Although some research studies have revealed beneficial uses of covert channel, which is natural given that many approaches have a double-edged sword impact, this chapter focuses on covert channels as a security threat that compromise our data and networks.
Title: Network Covert Channels
Description:
With the rapid advancement of communication and computer network technologies, covert channels are now more secure, quicker to set up, harder to detect, and easier to design than ever before.
By breaking a system security policy, a covert channel can be utilized to leak confidential communications.
Undoubtedly, one of the most difficult challenges is still detecting such harmful, unobservable, and covert dangers.
Due to the fact that this danger takes advantage of techniques not intended for communication, it is invisible to conventional security solutions.
This chapter offers a concise overview of covert channel concept, techniques, classifications, and countermeasures, emphasizing how new technologies are vulnerable to being exploited for initiation of different covert channels and how they offer a rich environment for developing effective but challenging covert channel attacks.
It gives a comprehensive review of common covert channel countermeasures with more focus on machine learning detection techniques.
Although some research studies have revealed beneficial uses of covert channel, which is natural given that many approaches have a double-edged sword impact, this chapter focuses on covert channels as a security threat that compromise our data and networks.
Related Results
Evaluation of the timing covert channel capacity considering packet transfer time distribution
Evaluation of the timing covert channel capacity considering packet transfer time distribution
Lampson was the first to introduce a covert channel as a channel that was not designed for information transmission. The problem of information leakage via network covert channels ...
A Covert Timing Channels Data Encryption Sceme In Cloud Simulation
A Covert Timing Channels Data Encryption Sceme In Cloud Simulation
Covert Timing Channels (CTC) have become an impending network security problem as the sophistication and use of data exfiltration carried out by cyber-attacks has increased. Inter-...
Cortisol and Oxytocin Could Predict Covert Aggression in Some Psychotic Patients
Cortisol and Oxytocin Could Predict Covert Aggression in Some Psychotic Patients
Background: The covert or indirect type of aggression has a risk of converting in violent acts and, considering that, it is very important to identify it in order to apply effectiv...
An ensemble model to detect packet length covert channels
An ensemble model to detect packet length covert channels
<span lang="EN-US">Covert channel techniques have enriched the way to commit dangerous and unwatched attacks. They exploit ways that are not intended to convey information; t...
A New Sensors-Based Covert Channel on Android
A New Sensors-Based Covert Channel on Android
Covert channels are not new in computing systems, and have been studied since their first definition four decades ago. New platforms invoke thorough investigations to assess their ...
Trends and Challenges in Network Covert Channels Countermeasures
Trends and Challenges in Network Covert Channels Countermeasures
Network covert channels are increasingly used to endow malware with stealthy behaviors, for instance to exfiltrate data or to orchestrate nodes of a botnet in a cloaked manner. Unf...
Covert Channel Communication as an Emerging Security Threat in 2.5D/3D Integrated Systems
Covert Channel Communication as an Emerging Security Threat in 2.5D/3D Integrated Systems
In this paper, first, a broad overview of existing covert channel communication-based security attacks is provided. Such covert channels establish a communication link between two ...
Clinical Importance of the Human Umbilical Artery Potassium Channels
Clinical Importance of the Human Umbilical Artery Potassium Channels
Potassium (K+) channels are usually predominant in the membranes of vascular smooth muscle cells (SMCs). These channels play an important role in regulating the membrane potential ...

