Conference Proceedings

Fourth International Conference on Advances in Information Processing and Communication Technology - IPCT 2016

Survey on Covert Storage Channel in Computer Network Protocols: Detection and Mitigation Techniques

Author(s) : MUAWIA A. ELSADIG, YAHIA A. FADLALLA

Abstract

Due to the rapid growth in number of different protocols over the internet, internet protocols have become an ideal vehicle for covert communications. They represent a high bandwidth for such communications. Moreover, new high-speed network technology has significantly amplified the network’s covert channel capacity. Certainly, a covert channel bandwidth of only one bit size can easily allow transmission of a system bin code which can lead to tremendous risk. This paper presents a brief overview of network protocols-based covert channels, and surveys some recent and relevant work on covert channels detection and elimination techniques along with their achievements and limitations. In sum, the covert channel countermeasures—detection, elimination, mitigation, and capacity reduction—are still real challenges and lag behind an acceptable level of network security. Therefore, the research door is wide open for more contributions in this field.

Conference Title : Fourth International Conference on Advances in Information Processing and Communication Technology - IPCT 2016
Conference Date(s) : 18-19 August 2016
Place : Hotel Novotel Roma La Rustica, Rome, Italy
No fo Author(s) : 2
DOI : 10.15224/978-1-63248-099-6-71
Page(s) : 79 - 85
Electronic ISBN : 978-1-63248-099-6
Views : 553   |   Download(s) : 140