Pattern-based survey and categorization of network covert channel techniques

S Wendzel, S Zander, B Fechner, C Herdin - ACM Computing Surveys …, 2015 - dl.acm.org
Network covert channels are used to hide communication inside network protocols. Various
techniques for covert channels have arisen in the past few decades. We surveyed and …

Covert channels in TCP/IP protocol stack-extended version

A Mileva, B Panajotov - Open Computer Science, 2014 - degruyter.com
Covert channels in TCP/IP protocol stack - extended version- Skip to content Should you have
institutional access? Here's how to get it ... De Gruyter € EUR - Euro £ GBP - Pound $ USD …

Unified description for network information hiding methods

S Wendzel, W Mazurczyk, S Zander - arXiv preprint arXiv:1512.07438, 2015 - arxiv.org
Until now hiding methods in network steganography have been described in arbitrary ways,
making them difficult to compare. For instance, some publications describe classical channel …

[PDF][PDF] A Distributed Covert Channel of the Packet Ordering Enhancement Model Based on Data Compression.

L Zhang, T Huang, X Hu, Z Zhang… - … Materials & Continua, 2020 - cdn.techscience.cn
Covert channel of the packet ordering is a hot research topic. Encryption technology is not
enough to protect the security of both sides of communication. Covert channel needs to hide …

区块链网络隐蔽信道研究进展

李雷孝, 杜金泽, 林浩, 高昊昱, 杨艳艳, 高静 - 通信学报, 2022 - infocomm-journal.com
数字货币伴生的区块链技术具有去中心化, 匿名性, 强稳健性和抗篡改性等特点,
是构建隐蔽通信信道的天然载体. 首先介绍了网络隐蔽信道的定义和发展历史 …

A generic taxonomy for steganography methods

S Wendzel, L Caviglione, W Mazurczyk, A Mileva… - Authorea …, 2023 - techrxiv.org
A unified understanding of terms and their applicability is essential for every scientific
discipline: steganography is no exception. Being divided into several domains (for instance …

On importance of steganographic cost for network steganography

W Mazurczyk, S Wendzel… - Security and …, 2016 - Wiley Online Library
Network steganography encompasses the information hiding techniques that can be applied
in communication network environments and that utilize hidden data carriers for this …

An enlarging-the-capacity packet sorting covert channel

L Zhang, T Huang, W Rasheed, X Hu, C Zhao - IEEE Access, 2019 - ieeexplore.ieee.org
The construction method of the covert channel has always been a topic of research and
exploration in the field of information security, and the use of IP data packets for covert …

A stealthy covert storage channel for asymmetric surveillance VoLTE endpoints

Q Zhang, X Zhang, Y Xue, J Hu - Future Generation Computer Systems, 2020 - Elsevier
The widely adaptation of shared or public cloud computing raises an amount of concerns
about privacy and information security. Establishing a covert channel is a feasible solution to …

A multi-layer steganographic method based on audio time domain segmented and network steganography

P Xue, H Liu, J Hu, R Hu - AIP Conference Proceedings, 2018 - pubs.aip.org
Both audio steganography and network steganography are belong to modern
steganography. Audio steganography has a large capacity. Network steganography is …