Blockchain meets covert communication: A survey

Z Chen, L Zhu, P Jiang, C Zhang, F Gao… - … Surveys & Tutorials, 2022 - ieeexplore.ieee.org
Covert communication enables covert information transmission in an undetectable way to
prevent the exposure of communication behaviors. Blockchain-based covert communication …

Covert channel detection: machine learning approaches

MA Elsadig, A Gafar - IEEE Access, 2022 - ieeexplore.ieee.org
The advanced development of computer networks and communication technologies has
made covert communications easier to construct, faster, undetectable and more secure than …

[HTML][HTML] Network Covert Channels

M Elsadig - 2024 - intechopen.com
With the rapid advancement of communication and computer network technologies, covert
channels are now more secure, quicker to set up, harder to detect, and easier to design than …

[PDF][PDF] An ensemble model to detect packet length covert channels.

MA Elsadig, A Gafar - … of Electrical & Computer Engineering (2088 …, 2023 - researchgate.net
Covert channel techniques have enriched the way to commit dangerous and unwatched
attacks. They exploit ways that are not intended to convey information; therefore, traditional …

Packet length covert channel: A detection scheme

MA Elsadig, YA Fadlalla - 2018 1st International Conference on …, 2018 - ieeexplore.ieee.org
A covert channel is a communication channel that is subjugated for illegal flow of information
in a way that violates system security policies. It is a dangerous, invisible, undetectable, and …

An RTP extension for reliable user-data transmission over VoIP traffic

J Gao, Y Li, H Jiang, L Liu, X Zhang - … and Privacy in Social Networks and …, 2019 - Springer
Covert channels are those breaking the restrictions of the legitimate channel and
transmitting covert messages secretly. According to the modulation methods, the covert …

[PDF][PDF] Packet length covert channel detection: An ensemble machine learning approach

M Elsadig, A Gafar - Journal of Theoretical and Applied …, 2022 - researchgate.net
The use of covert channel techniques has increased the capacity to carry out dangerous and
undetectable attacks. Traditional security procedures cannot identify them because they …

New High Secure Network Steganography Method Based on Packet Length.

V Sabeti, M Shoaei - ISeCure, 2020 - search.ebscohost.com
In the network steganography methods based on packet length, the length of the packets is
used as a carrier for exchanging secret messages. Existing methods in this area are …

[PDF][PDF] Detection of Size Modulation Covert Channels Using Countermeasure Variation.

S Wendzel, F Link, D Eller, W Mazurczyk - J. Univers. Comput. Sci., 2019 - academia.edu
Network covert channels enable stealthy communications for malware and data exfiltration.
For this reason, developing effective countermeasures for these threats is important for the …

Detecting zero-day polymorphic worm: A review

SMA Sulieman, YA Fadlalla - 2018 21st Saudi Computer …, 2018 - ieeexplore.ieee.org
a computer worm is malicious software that has the capability to spread and replicate itself
into a computer network. A polymorphic worm is a specific type of worm that changed its …