2007
DOI: 10.1007/978-3-540-74835-9_19
|View full text |Cite
|
Sign up to set email alerts
|

Cloak: A Ten-Fold Way for Reliable Covert Communications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
27
0

Year Published

2007
2007
2020
2020

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 32 publications
(27 citation statements)
references
References 6 publications
0
27
0
Order By: Relevance
“…The detection of covert timing channels is accomplished using statistical tests to differentiate covert traffic from legitimate traffic. While the focus of earlier work is on disrupting covert timing channels [9], [10], [11], [12], [13] or on eliminating them in the design of systems [14], [15], [16], more recent research has begun to investigate the design and detection of covert timing channels [1], [2], [3], [4], [17], [5], [18]. In the following subsections, we give an overview of recent research on covert timing channels and detection tests.…”
Section: Background and Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…The detection of covert timing channels is accomplished using statistical tests to differentiate covert traffic from legitimate traffic. While the focus of earlier work is on disrupting covert timing channels [9], [10], [11], [12], [13] or on eliminating them in the design of systems [14], [15], [16], more recent research has begun to investigate the design and detection of covert timing channels [1], [2], [3], [4], [17], [5], [18]. In the following subsections, we give an overview of recent research on covert timing channels and detection tests.…”
Section: Background and Related Workmentioning
confidence: 99%
“…Luo et al [4] designed a combinatorics-based scheme, called Cloak, to transmit information in the ordering of packets within different flows. Cloak can be considered as a storage and timing channel, as the encoding methods require packets and/or flows to be distinguishable by their contents.…”
Section: Other Covert Timing Channelsmentioning
confidence: 99%
See 1 more Smart Citation
“…ACKLeaks can evade contentbased detection methods and can be implemented by exploiting the existing TCP connections. Cloak [69] is a Active warden and egress filtering [34] new class of reliable timing covert channels, which encodes a message by a unique distribution of N packets over X TCP flows with ten different encoding and decoding methods, and carefully crafted to mimic the normal TCP flows. Sender can establish HTTP session with a remote server which consists of several TCP flows, or with multiple servers.…”
Section: Steganography In Transport Layermentioning
confidence: 99%
“…The detection of covert timing channels is mainly accomplished using statistical tests to differentiate covert traffic from legitimate traffic. While the focus of earlier work is on the disruption of covert timing channels [4][5][6][7][8], more recent research has begun to investigate the design and detection of covert timing channels [9][10][11][12]14].…”
Section: Related Workmentioning
confidence: 99%