2016
DOI: 10.1109/te.2016.2520400
|View full text |Cite
|
Sign up to set email alerts
|

A Network Steganography Lab on Detecting TCP/IP Covert Channels

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
4
2

Relationship

1
5

Authors

Journals

citations
Cited by 16 publications
(8 citation statements)
references
References 12 publications
0
8
0
Order By: Relevance
“…We are currently developing a first open‐source version of the DAT software as well as a testbed for the generation of covert channels based on techniques described in the related literature. Moreover, we have already incorporated some of the introduced detection techniques in our ‘Network Security Advanced Laboratory’ at TU Wien , included in the academic program of electrical engineering students.…”
Section: Discussionmentioning
confidence: 99%
“…We are currently developing a first open‐source version of the DAT software as well as a testbed for the generation of covert channels based on techniques described in the related literature. Moreover, we have already incorporated some of the introduced detection techniques in our ‘Network Security Advanced Laboratory’ at TU Wien , included in the academic program of electrical engineering students.…”
Section: Discussionmentioning
confidence: 99%
“…Recently, covert channels were employed by cyber-attacks, i.e., to permit a covert transmission of malware data. Nevertheless, they could also be applied for legitimate goals, such as transmitting illicit information under Internet censorship [ 14 , 98 , 107 ].…”
Section: Literature Reviewmentioning
confidence: 99%
“…to access sensitive information during data transmission. Therefore, demand is growing for intelligence and multimedia security studies that involve not only encryption, but also covert communication whose essence lies in concealing data [ 1 , 2 , 3 , 4 , 5 , 6 , 7 , 8 , 9 , 10 , 11 , 12 , 13 , 14 , 15 , 16 , 17 , 18 , 19 ]. Recently, information hiding or data hiding in digital texts, known as text hiding, has drawn considerable attention due to its extensive usage, and potential applications in the cybersecurity and network communication industries [ 20 , 21 , 22 , 23 , 24 , 25 , 26 , 27 , 28 , 29 , 30 , 31 , 32 , 33 , 34 , 35 , 36 , 37 , 38 , 39 , 40 , 41 , 42 , 43 , 44 , 45 , 46 , 47 , 48 , 49 , 50 , 51 , 52 ...…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…The research work proposed in [21] and [22] adopts a Support Vector Machine (SVM) technique proved to be highly effective to detect covert channels in comparison with other techniques. As the SVM is the best approach currently used for covert data channel detection, it was an obvious choice for us to compare our proposed algorithm against this type of detection approach in [21] in the context of ISNs.…”
Section: Comparison With Related Workmentioning
confidence: 99%