2019
DOI: 10.1109/access.2019.2945320
|View full text |Cite
|
Sign up to set email alerts
|

An Enlarging-the-Capacity Packet Sorting Covert Channel

Abstract: The construction method of the covert channel has always been a topic of research and exploration in the field of information security, and the use of IP data packets for covert channel construction is also an important method. Based on the above content, this paper proposes an enlarging-the-capacity packet sorting covert channel. We establish enlarging-the-capacity packet sorting covert channel model and derive the functional relationship between the total number of covert information transmitted and the numb… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
4
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 10 publications
(6 citation statements)
references
References 29 publications
(20 reference statements)
0
4
0
Order By: Relevance
“…L /( R − L )!, and its capacity is ⌊ log 2 N ⌋/ R in bits per packet. The capacity may be even higher if single-link NCCs are combined with Cloak to establish a hybrid covert channel [ 28 ].…”
Section: Methodsmentioning
confidence: 99%
“…L /( R − L )!, and its capacity is ⌊ log 2 N ⌋/ R in bits per packet. The capacity may be even higher if single-link NCCs are combined with Cloak to establish a hybrid covert channel [ 28 ].…”
Section: Methodsmentioning
confidence: 99%
“…Covert channels are mainly divided into two types: storage covert channels (SCC) and timing covert channels (TCT) [15]. In storage channels, storage location is used to hold a covert message [16] such as protocol fields, whereas in timing channels, a covert message is modulated using the timing characteristics of the network traffic.…”
Section: Covert Channel Typesmentioning
confidence: 99%
“…A covert channel is unlike traditional secret message transfer methods in which not only the transmission content is hidden, but the transfer path itself is also protected [11]. In particular, network-covert channels maintain two aspects to secure the transmission of secret messages.…”
Section: Introductionmentioning
confidence: 99%