Search Swinburne Research Bank
Please use this identifier to cite or link to this item: http://hdl.handle.net/1959.3/30120
|Download PDF (Published version) (Adobe Acrobat PDF, -1 bytes)|
- Covert channels and countermeasures in computer network protocols
- Zander, Sebastian; Armitage, Grenville J.; Branch, Philip A.
- Covert channels are used for the secret transfer of information. Encryption only protects communication from being decoded by unauthorized parties, whereas covert channels aim to hide the very existence of the communication. Initially, covert channels were identified as a security threat on monolithic systems such as mainframes. More recently, focus has shifted toward covert channels in computer network protocols. The huge amount of data and large number of different protocols in the Internet is ideal as a high-bandwidth vehicle for covert communication. This article provides an overview of the existing techniques for creating covert channels in widely deployed network protocols, and common methods for their detection, elimination, and capacity limitation.
- Publication type
- Journal article
- Research centre
- Swinburne University of Technology. Faculty of Information and Communication Technologies. Centre for Advanced Internet Architectures
- IEEE Communications Magazine, Vol. 45, no. 12 (Dec 2007), p. 136-142
- Publication year
- Computer network protocols; Computer networks; Computer systems; Digital communications; Information networks; Information technology; Local area networks; Network computers; Telecommunication systems
- Publisher URL
- Copyright © 2007 IEEE. Published version of the paper reproduced here in accordance with the copyright policy of the publisher. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.
- Full text
- Peer reviewed