Mostrar el registro sencillo del ítem
Covert Communications through Network Configuration Messages
dc.contributor.author | Ríos-del-Pozo, Rubén | |
dc.contributor.author | Onieva-González, José Antonio | |
dc.contributor.author | López-Muñoz, Francisco Javier | |
dc.date.accessioned | 2025-06-05T07:26:44Z | |
dc.date.available | 2025-06-05T07:26:44Z | |
dc.date.issued | 2013 | |
dc.identifier.citation | Ruben Rios, Jose A. Onieva, Javier Lopez Covert Communications through Network Configuration Messages In: Computers & Security, vol. 39, Part A, pp. 34 – 46, 2013, ISSN: 0167-4048 | es_ES |
dc.identifier.uri | https://hdl.handle.net/10630/38872 | |
dc.description | Política de acceso abierto: https://openpolicyfinder.jisc.ac.uk/id/publication/27894 | es_ES |
dc.description.abstract | Covert channels are a form of hidden communication that may violate the integrity of systems. Since their birth in Multi-Level Security systems in the early 70's they have evolved considerably, such that new solutions have appeared for computer networks mainly due to vague protocols specifications. In this paper we concentrate on short-range covert channels and analyze the opportunities of concealing data in various extensively used protocols today. From this analysis we observe several features that can be effectively exploited for subliminal data transmission in the Dynamic Host Configuration Protocol (DHCP). The result is a proof-of-concept implementation, HIDE_DHCP, which integrates three different covert channels each of which accommodate to different stealthiness and capacity requirements. Finally, we provide a theoretical and experimental analysis of this tool in terms of its reliability, capacity, and detectability. | es_ES |
dc.language.iso | eng | es_ES |
dc.publisher | Elsevier | es_ES |
dc.subject | Redes de ordenadores - Medidas de seguridad | es_ES |
dc.subject.other | Covert channels | es_ES |
dc.subject.other | System information security | es_ES |
dc.subject.other | Network security | es_ES |
dc.subject.other | Information warfare | es_ES |
dc.subject.other | Intrusion detection | es_ES |
dc.title | Covert Communications through Network Configuration Messages | es_ES |
dc.type | journal article | es_ES |
dc.centro | E.T.S.I. Informática | es_ES |
dc.identifier.doi | 10.1016/j.cose.2013.03.004 | |
dc.type.hasVersion | SMUR | es_ES |
dc.departamento | Lenguajes y Ciencias de la Computación | es_ES |
dc.rights.accessRights | open access | es_ES |