Repository logo
Communities & Collections
Research Outputs
Fundings & Projects
People
Statistics
User Manual
Have you forgotten your password?
  1. Home
  2. Faculty of Computer Science and Engineering
  3. International Conference on Informatics and Information Technologies
  4. A survey of covert channels: Benign and malicious usage, conditions for creation and countermeasures
Details

A survey of covert channels: Benign and malicious usage, conditions for creation and countermeasures

Date Issued
2020-05-08
Author(s)
Ema Stamenkovska
Vesna Dimitrova
Abstract
Secure communication is of great importance to everyone, but how to secure a communication when a method that can hide its very existence exists? This can be achieved by a covert channel which can be used for a secret transfer of information. The following article gives a survey of the types of covert channels, the basic conditions for creating an undetectable covert channel as well as the countermeasures that can be taken for its limitation or elimination. An example of a covert channel attack (more specifically DNS tunneling) will be shown. The need for a data leak prevention system, a tool that helps safeguard the sensitive data will be punctuated. Some of the covert channels’ uses for corrupt causes will be mentioned. In some cases, security can be actually improved by the use of covert channels.
File(s)
Loading...
Thumbnail Image
Name

CIIT2020_paper_12.pdf

Size

622.74 KB

Format

Adobe PDF

Checksum

(MD5):2f2d29645ba0cd5db654caf04a322de7

⠀

Built with DSpace-CRIS software - Extension maintained and optimized by 4Science

  • Accessibility settings
  • Privacy policy
  • End User Agreement
  • Send Feedback
Repository logo COAR Notify