The Community for Technology Leaders
2013 Ninth International Conference on Computational Intelligence and Security (2009)
Beijing, China
Dec. 11, 2009 to Dec. 14, 2009
ISBN: 978-0-7695-3931-7
pp: 499-503
Covert channels are widely used for secret information transmission on networks. Although existing packet length based covert channels have great tamper resistance, they fail to deliver normal network traffic especially when the amounts of covert messages increase. As such, they are vulnerable to detections due to abnormal network traffic. Hence, in this paper, we are motivated to design a protocol-independent normal-traffic network covert channel based on message length, which has great resistance to network traffic detections.
network covert channels, message length, nomal traffic, information hiding, secret protecting

X. Niu, Y. Song, H. Liang and L. Ji, "A Normal-Traffic Network Covert Channel," 2009 International Conference on Computational Intelligence and Security(CIS), Beijing, China, 2009, pp. 499-503.
90 ms
(Ver 3.3 (11022016))