2007
DOI: 10.1504/ijamc.2007.014811
|View full text |Cite
|
Sign up to set email alerts
|

A novel covert channel based on the IP header record route option

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
17
0
1

Year Published

2010
2010
2022
2022

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 28 publications
(18 citation statements)
references
References 15 publications
0
17
0
1
Order By: Relevance
“…Covert channel bisa dibangun menggunakan header protokol sebagai pembawa pesan, salah satunya adalah penggunaan protokol TCP, IP, dan ARP [2], [3], [4], [5], [6], [7], [8], penggunaan HTTP untuk membangun komunikasi covert channel juga mungkin dilakukan [9]. Pemanfaatan covert channel untuk FTP (File Transfer Protocol) juga telah diteliti [6], dimana mereka membuat aplikasi FTP berbasis covert channel dengan memanfaatkan field IP record route.…”
Section: Pendahuluanunclassified
“…Covert channel bisa dibangun menggunakan header protokol sebagai pembawa pesan, salah satunya adalah penggunaan protokol TCP, IP, dan ARP [2], [3], [4], [5], [6], [7], [8], penggunaan HTTP untuk membangun komunikasi covert channel juga mungkin dilakukan [9]. Pemanfaatan covert channel untuk FTP (File Transfer Protocol) juga telah diteliti [6], dimana mereka membuat aplikasi FTP berbasis covert channel dengan memanfaatkan field IP record route.…”
Section: Pendahuluanunclassified
“…They can invisibly exchange data in the network if the network does not know the steganographic technique. [5], [6] and [7] show different possibilities for hiding data by using specificities of protocol to create a hidden channel (steganographic channel). The most used techniques consist of using the reserved field of the protocol.…”
Section: Related Workmentioning
confidence: 99%
“…They can invisibly exchange data in the network if the network does not know the steganographic technique. [5], [6] and [7] show different possibilities for hiding data by using specificities of protocol to create a hidden channel (steganographic channel). The most used techniques consist of using the reserved field of the protocol.…”
Section: Related Workmentioning
confidence: 99%