A comprehensive survey of covert communication techniques, limitations and future challenges

I Makhdoom, M Abolhasan, J Lipman - Computers & Security, 2022 - Elsevier
Data encryption aims to protect the confidentiality of data at storage, during transmission, or
while in processing. However, it is not always the optimum choice as attackers know the …

A survey of key technologies for constructing network covert channel

J Tian, G Xiong, Z Li, G Gou - Security and Communication …, 2020 - Wiley Online Library
In order to protect user privacy or guarantee free access to the Internet, the network covert
channel has become a hot research topic. It refers to an information channel in which the …

[PDF][PDF] Survey on covert storage channel in computer network protocols: detection and mitigation techniques

MA Elsadig, YA Fadlalla - … of Advances in Computer Networks and …, 2016 - researchgate.net
Due to the rapid growth in number of different protocols over the internet, internet protocols
have become an ideal vehicle for covert communications. They represent a high bandwidth …

A two-way VoLTE covert channel with feedback adaptive to mobile network environment

X Zhang, L Guo, Y Xue, Q Zhang - IEEE Access, 2019 - ieeexplore.ieee.org
In the existing network covert channel research, the transmission of secret messages is one-
way, lacking confirmation feedback on whether the secret message is successfully accepted …

Network protocol covert channels: Countermeasures techniques

MA Elsadig, YA Fadlalla - 2017 9th IEEE-GCC Conference and …, 2017 - ieeexplore.ieee.org
advanced developments in intrusion detection systems (IDS) and computer network
technology encourage hackers to find new ways to leak confidential information without …

[PDF][PDF] Covert Channels in Transport Layer Security: Performance and Security Assessment.

C Heinz, M Zuppelli, L Caviglione - J. Wirel. Mob. Networks …, 2021 - academia.edu
The ability of creating covert channels within network traffic is now largely exploited by
malware to elude detection, remain unnoticed while exfiltrating data or coordinating an …

Efficient distributed network covert channels for Internet of things environments

K Cabaj, P Żórawski, P Nowakowski… - Journal of …, 2020 - academic.oup.com
Each day more and more Internet of Things (IoT) devices are being connected to the
Internet. In general, their applications are diverse but from the security perspective, it is …

On importance of steganographic cost for network steganography

W Mazurczyk, S Wendzel… - Security and …, 2016 - Wiley Online Library
Network steganography encompasses the information hiding techniques that can be applied
in communication network environments and that utilize hidden data carriers for this …

Protocol proxy: An fte-based covert channel

J Oakley, L Yu, X Zhong, GK Venayagamoorthy… - Computers & …, 2020 - Elsevier
In a hostile network environment, users must communicate without being detected. This
involves blending in with the existing traffic. In some cases, a higher degree of secrecy is …

Covert channels in transport layer security

C Heinz, W Mazurczyk, L Caviglione - Proceedings of the 2020 …, 2020 - dl.acm.org
Network covert channels embedded within network conversations are becoming widely
adopted to enforce privacy of users or bypass censorship attempts as well as by malware to …