Please use this identifier to cite or link to this item: http://hdl.handle.net/20.500.12188/8190
Title: A survey of covert channels: Benign and malicious usage, conditions for creation and countermeasures
Authors: Ema Stamenkovska
Vesna Dimitrova
Issue Date: 8-May-2020
Publisher: Ss Cyril and Methodius University in Skopje, Faculty of Computer Science and Engineering, Republic of North Macedonia
Series/Report no.: CIIT 2020 short papers;12
Conference: 17th International Conference on Informatics and Information Technologies - CIIT 2020
Abstract: Secure communication is of great importance to everyone, but how to secure a communication when a method that can hide its very existence exists? This can be achieved by a covert channel which can be used for a secret transfer of information. The following article gives a survey of the types of covert channels, the basic conditions for creating an undetectable covert channel as well as the countermeasures that can be taken for its limitation or elimination. An example of a covert channel attack (more specifically DNS tunneling) will be shown. The need for a data leak prevention system, a tool that helps safeguard the sensitive data will be punctuated. Some of the covert channels’ uses for corrupt causes will be mentioned. In some cases, security can be actually improved by the use of covert channels.
URI: http://hdl.handle.net/20.500.12188/8190
Appears in Collections:International Conference on Informatics and Information Technologies

Files in This Item:
File Description SizeFormat 
CIIT2020_paper_12.pdf622.74 kBAdobe PDFThumbnail
View/Open
Show full item record

Page view(s)

745
checked on Apr 29, 2024

Download(s)

220
checked on Apr 29, 2024

Google ScholarTM

Check


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.