Covert Communications through Network Configuration Messages

dc.centroE.T.S.I. Informáticaes_ES
dc.contributor.authorRíos-del-Pozo, Rubén
dc.contributor.authorOnieva-González, José Antonio
dc.contributor.authorLópez-Muñoz, Francisco Javier
dc.date.accessioned2025-06-05T07:26:44Z
dc.date.available2025-06-05T07:26:44Z
dc.date.issued2013
dc.departamentoLenguajes y Ciencias de la Computaciónes_ES
dc.descriptionPolítica de acceso abierto: https://openpolicyfinder.jisc.ac.uk/id/publication/27894es_ES
dc.description.abstractCovert channels are a form of hidden communication that may violate the integrity of systems. Since their birth in Multi-Level Security systems in the early 70's they have evolved considerably, such that new solutions have appeared for computer networks mainly due to vague protocols specifications. In this paper we concentrate on short-range covert channels and analyze the opportunities of concealing data in various extensively used protocols today. From this analysis we observe several features that can be effectively exploited for subliminal data transmission in the Dynamic Host Configuration Protocol (DHCP). The result is a proof-of-concept implementation, HIDE_DHCP, which integrates three different covert channels each of which accommodate to different stealthiness and capacity requirements. Finally, we provide a theoretical and experimental analysis of this tool in terms of its reliability, capacity, and detectability.es_ES
dc.identifier.citationRuben Rios, Jose A. Onieva, Javier Lopez Covert Communications through Network Configuration Messages In: Computers & Security, vol. 39, Part A, pp. 34 – 46, 2013, ISSN: 0167-4048es_ES
dc.identifier.doi10.1016/j.cose.2013.03.004
dc.identifier.urihttps://hdl.handle.net/10630/38872
dc.language.isoenges_ES
dc.publisherElsevieres_ES
dc.rights.accessRightsopen accesses_ES
dc.subjectRedes de ordenadores - Medidas de seguridades_ES
dc.subject.otherCovert channelses_ES
dc.subject.otherSystem information securityes_ES
dc.subject.otherNetwork securityes_ES
dc.subject.otherInformation warfarees_ES
dc.subject.otherIntrusion detectiones_ES
dc.titleCovert Communications through Network Configuration Messageses_ES
dc.typejournal articlees_ES
dc.type.hasVersionSMURes_ES
dspace.entity.typePublication
relation.isAuthorOfPublicationc85f06a0-993b-4cfe-9cf3-4b943851b9e4
relation.isAuthorOfPublicationfafd97ab-7fd5-4caa-89ac-4fb9a0ef827a
relation.isAuthorOfPublicationc1875514-a0c5-4d77-a6f1-f7dfc736eeb2
relation.isAuthorOfPublication.latestForDiscoveryc85f06a0-993b-4cfe-9cf3-4b943851b9e4

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
rios2013a.pdf
Size:
660.4 KB
Format:
Adobe Portable Document Format
Description:

Collections