Behavior-based covert channel in cyberspace

Show full item record

Title: Behavior-based covert channel in cyberspace
Author: Johnson, Daryl; Yuan, Bo; Lutz, Peter
Abstract: Many covert channels take advantages of weaknesses, flaws, or unused data fields in network protocols. In this paper, a behavior-based covert channel, that takes advantages of behavior of an application, is presented along with a formal definition in the framework of finite state machines. The behavior-based covert channel is application specific and lies at the application layer of the network OSI model, which makes the detection of this type of covert channel much more difficult. A detailed sample implementation demonstrates an example of this type of covert channel in the form of a simple online two-person game. The potential of this type of covert channel is also discussed.
Record URI: http://hdl.handle.net/1850/14795
Date: 2009

Files in this item

Files Size Format View
ISKE-2009_Behav ... Channel in Cyberspace.pdf 162.3Kb PDF View/Open

The following license files are associated with this item:

This item appears in the following Collection(s)

Show full item record

Search RIT DML


Advanced Search

Browse