Sciweavers

5 search results - page 1 / 1
» Covert Channel Forensics on the Internet: Issues, Approaches...
Sort
View
IJNSEC
2007
194views more  IJNSEC 2007»
13 years 4 months ago
Covert Channel Forensics on the Internet: Issues, Approaches, and Experiences
The exponential growth of the Internet (WWW in particular) has opened-up several avenues for covert channel communication. Steganographic communication is one such avenue. Hiding ...
Ashish Patel, M. Shah, Rajarathnam Chandramouli, K...
SADFE
2005
IEEE
13 years 10 months ago
SecSyslog: an Approach to Secure Logging Based on Covert Channels
Today log traces are widely used to identify and prevent violations of corporate information systems. The most recent logging trend is to manage most level 3 ISO/OSI traffic via p...
Dario V. Forte, Cristiano Maruti, Michele R. Vettu...
SEC
2007
13 years 6 months ago
Crafting Web Counters into Covert Channels
We present in this paper a new network storage channel WebShare that uses the plentiful, public Web counters for storage. Therefore, the physical locations of the WebShare encoder ...
Xiapu Luo, Edmond W. W. Chan, Rocky K. C. Chang
CORR
2008
Springer
112views Education» more  CORR 2008»
13 years 4 months ago
SecMon: End-to-End Quality and Security Monitoring System
The Voice over Internet Protocol (VoIP) is becoming a more available and popular way of communicating for Internet users. This also applies to Peer-to-Peer (P2P) systems and mergi...
Tomasz Ciszkowski, Charlott Eliasson, Markus Fiedl...
WMI
2001
112views more  WMI 2001»
13 years 5 months ago
Quality of service and mobility for the wireless internet
Our paper explores the issue of how to provide appropriate quality of service mechanisms closely integrated with flexible mobility management in wireless local area networks. We co...
J. Antonio García-Macías, Franck Rou...