4. Generalization
The implementation of a covert channel relies on two distinct issues: on the one hand, the information transport vector, and on the other, the way in which the information is encoded. In this section, we focus on both aspects.
4.1 A vehicle for communication
In the context of networks, there are usually two ways of constructing a covert channel:
use "neglected" data;
modify a field used by the protocol.
In
Exclusive to subscribers. 97% yet to be discovered!
Already subscribed? Log in!
Generalization
Article included in this offer
"Security of information systems"
(
86 articles
)
Updated and enriched with articles validated by our scientific committees
A set of exclusive tools to complement the resources
References
Exclusive to subscribers. 97% yet to be discovered!
Already subscribed? Log in!