Initial publication | S. Wendzel, S. Zander, B. Fechner, C. Herdin in [1] |
Illustration | The covert channel sender alters the data rate of traffic from itself or a third party to the covert channel receiver. |
Alias | Throughput Pattern |
Context | Network Covert Timing Channels -> Protocol-agnostic |
Evidence | X. Li, Y. Zhang, F.T. Chong, and B.Y. Zhao. 2011. A Covert Channel Analysis of a Real Switch. Technical Report. Dep. of Computer Science, University of California, Santa Barbara. T. G. Handel and M. T. Sandford, II. 1996. Hiding Data in the OSI Network Model. In Proc. First Interna- tional Workshop on Information Hiding. Springer, London, UK, 23–38. Another possible example for a rate pattern-based hiding technique is mentioned in [1]. |
Implementation | ? |
References:
[1] S. Wendzel, S. Zander, B. Fechner, C. Herdin: Pattern-based Survey and Categorization of Network Covert Channel Techniques, ACM Computing Surveys, Vol. 47, Issue 3, pp. 50:1-26, ACM, 2015.
An early version of the article is available here: download.
Keine Kommentare:
Kommentar veröffentlichen