The Community for Technology Leaders
2013 Ninth International Conference on Computational Intelligence and Security (2009)
Beijing, China
Dec. 11, 2009 to Dec. 14, 2009
ISBN: 978-0-7695-3931-7
pp: 499-503
ABSTRACT
Covert channels are widely used for secret information transmission on networks. Although existing packet length based covert channels have great tamper resistance, they fail to deliver normal network traffic especially when the amounts of covert messages increase. As such, they are vulnerable to detections due to abnormal network traffic. Hence, in this paper, we are motivated to design a protocol-independent normal-traffic network covert channel based on message length, which has great resistance to network traffic detections.
INDEX TERMS
network covert channels, message length, nomal traffic, information hiding, secret protecting
CITATION
Xiamu Niu, Yitao Song, Haijin Liang, Liping Ji, "A Normal-Traffic Network Covert Channel", 2013 Ninth International Conference on Computational Intelligence and Security, vol. 01, no. , pp. 499-503, 2009, doi:10.1109/CIS.2009.156
96 ms
(Ver 3.3 (11022016))