2011
DOI: 10.1007/978-3-642-23496-5_8
|View full text |Cite
|
Sign up to set email alerts
|

Towards a Protocol for Autonomic Covert Communication

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2012
2012
2020
2020

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 26 publications
0
3
0
Order By: Relevance
“…Selection techniques for network covert storage channels were already presented in the past. For instance, Li et al developed an approach that uses the concept of natural selection to determine suitable network protocols which can be used for a covert communication [10] and Yarochkin et al presented similar work to evaluate utilizable network protocols based on passive network monitoring [24].…”
Section: Micro Protocol Engineeringmentioning
confidence: 99%
See 1 more Smart Citation
“…Selection techniques for network covert storage channels were already presented in the past. For instance, Li et al developed an approach that uses the concept of natural selection to determine suitable network protocols which can be used for a covert communication [10] and Yarochkin et al presented similar work to evaluate utilizable network protocols based on passive network monitoring [24].…”
Section: Micro Protocol Engineeringmentioning
confidence: 99%
“…Using micro protocols, covert channel systems can build hidden overlay networks [23], and can adapt to changes in the underlay network (e.g. changing firewall rules) [10,24]. Up to now, micro protocols were designed in an ad hoc manner.…”
Section: Introductionmentioning
confidence: 99%
“…The timing method can encode the secret information by changing the sending rate of packet [44,45,46,47], interpacket delay [48,49,50,51], and changing the order of packet [52,53,54,55], etc.…”
Section: Network Steganographymentioning
confidence: 99%