Survey on Covert Storage Channel in Computer Network Protocols: Detection and Mitigation Techniques

MUAWIA, A. ELSADIG and YAHIA, A. FADLALLA (2016) Survey on Covert Storage Channel in Computer Network Protocols: Detection and Mitigation Techniques. In: Fourth International Conference on Advances in Information Processing and Communication Technology - IPCT 2016, 18-19 August 2016, Rome, Italy.

[img]
Preview
Text
20160908_063600.pdf - Published Version

Download (551kB) | Preview
Official URL: https://www.seekdl.org/conferences/paper/details/8...

Abstract

Due to the rapid growth in number of different protocols over the internet, internet protocols have become an ideal vehicle for covert communications. They represent a high bandwidth for such communications. Moreover, new high-speed network technology has significantly amplified the network’s covert channel capacity. Certainly, a covert channel bandwidth of only one bit size can easily allow transmission of a system bin code which can lead to tremendous risk. This paper presents a brief overview of network protocols-based covert channels, and surveys some recent and relevant work on covert channels detection and elimination techniques along with their achievements and limitations. In sum, the covert channel countermeasures—detection, elimination, mitigation, and capacity reduction—are still real challenges and lag behind an acceptable level of network security. Therefore, the research door is wide open for more contributions in this field.

Item Type: Conference or Workshop Item (Paper)
Uncontrolled Keywords: covert channel, security; detection, prevention,elimination, capacity reduction, network protocols.
Depositing User: Mr. John Steve
Date Deposited: 22 Mar 2019 11:55
Last Modified: 22 Mar 2019 11:55
URI: http://publications.theired.org/id/eprint/815

Actions (login required)

View Item View Item