Ве молиме користете го овој идентификатор да го цитирате или поврзете овој запис: http://hdl.handle.net/20.500.12188/8190
DC FieldValueLanguage
dc.contributor.authorEma Stamenkovskaen_US
dc.contributor.authorVesna Dimitrovaen_US
dc.date.accessioned2020-05-21T06:29:56Z-
dc.date.available2020-05-21T06:29:56Z-
dc.date.issued2020-05-08-
dc.identifier.urihttp://hdl.handle.net/20.500.12188/8190-
dc.description.abstractSecure communication is of great importance to everyone, but how to secure a communication when a method that can hide its very existence exists? This can be achieved by a covert channel which can be used for a secret transfer of information. The following article gives a survey of the types of covert channels, the basic conditions for creating an undetectable covert channel as well as the countermeasures that can be taken for its limitation or elimination. An example of a covert channel attack (more specifically DNS tunneling) will be shown. The need for a data leak prevention system, a tool that helps safeguard the sensitive data will be punctuated. Some of the covert channels’ uses for corrupt causes will be mentioned. In some cases, security can be actually improved by the use of covert channels.en_US
dc.language.isoenen_US
dc.publisherSs Cyril and Methodius University in Skopje, Faculty of Computer Science and Engineering, Republic of North Macedoniaen_US
dc.relation.ispartofseriesCIIT 2020 short papers;12-
dc.titleA survey of covert channels: Benign and malicious usage, conditions for creation and countermeasuresen_US
dc.typeProceeding articleen_US
dc.relation.conference17th International Conference on Informatics and Information Technologies - CIIT 2020en_US
item.fulltextWith Fulltext-
item.grantfulltextopen-
Appears in Collections:International Conference on Informatics and Information Technologies
Files in This Item:
File Опис SizeFormat 
CIIT2020_paper_12.pdf622.74 kBAdobe PDFThumbnail
View/Open
Прикажи едноставен запис

Page view(s)

941
checked on 19.7.2025

Download(s)

264
checked on 19.7.2025

Google ScholarTM

Проверете


Записите во DSpace се заштитени со авторски права, со сите права задржани, освен ако не е поинаку наведено.