1,708 Hits in 5.1 sec

Covert Ephemeral Communication in Named Data Networking [article]

Moreno Ambrosin, Mauro Conti, Paolo Gasti, Gene Tsudik
2013 arXiv   pre-print
In this paper we investigate how to use this state for covert ephemeral communication (CEC).  ...  Named Data Networking (NDN), an instantiation of the content-centric approach to networking, is one such effort. In contrast with IP, NDN routers maintain a significant amount of user-driven state.  ...  RELATED WORK We divide relevant related work in two classes: covert communication and ephemeral communication. Covert Communication.  ... 
arXiv:1311.2517v1 fatcat:fvmgqhyxovdttgf67jkaksnayy

Covert ephemeral communication in named data networking

Moreno Ambrosin, Mauro Conti, Paolo Gasti, Gene Tsudik
2014 Proceedings of the 9th ACM symposium on Information, computer and communications security - ASIA CCS '14  
Named Data Networking (NDN), an instantiation of the content-centric approach, is one such effort.  ...  In contrast with their IP counterparts, NDN routers maintain a significant amount of state information. In this paper, we investigate the use of this feature for covert ephemeral communication (CEC).  ...  RELATED WORK We divide relevant related work in two classes: covert communication and ephemeral communication. Covert Communication.  ... 
doi:10.1145/2590296.2590306 dblp:conf/ccs/AmbrosinCGT14 fatcat:2qabkd6fc5fsfjb6gcchzl7d6a

Hidden and Uncontrolled - On the Emergence of Network Steganographic Threats [article]

Steffen Wendzel, Wojciech Mazurczyk, Luca Caviglione, Michael Meier
2014 arXiv   pre-print
Similarly, other malicious activities can profit from network steganography, such as data leakage or the exchange of pedophile data.  ...  We discuss the issues related to countering network steganography in practice and provide an outlook on further research directions and problems.  ...  They focus on so called ephemeral covert communication where the communicating parties are not exchanging any packets directly instead they intentionally influence the content of the router's cache and  ... 
arXiv:1407.2029v1 fatcat:5lxmcprh6zf4fd6a5csuqv53oq

Detecting Network Covert Channels using Machine Learning, Data Mining and Hierarchical Organisation of Frequent Sets

Piotr Nowakowski, Piotr Zórawski, Krzysztof Cabaj, Wojciech Mazurczyk
2021 Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications  
Next, in section 4 the proposed network covert channel detection strategy is introduced.  ...  One flavor of such methods are network covert channels, which, to transfer secret data, utilize subtle modifications to the legitimate network traffic.  ...  The supported project is named CoCoDe -Covert Communication Detection.  ... 
doi:10.22667/jowua.2021.03.31.020 dblp:journals/jowua/NowakowskiZCM21 fatcat:hvgmngp7fzh7rddweqnlirhfwq

Pssst, over here: Communicating without fixed infrastructure

Tom Callahan, Mark Allman, Michael Rabinovich
2012 2012 Proceedings IEEE INFOCOM  
Our techniques leverage the caching and aging properties of DNS records to create a covert channel of sorts that can be used to store ephemeral information.  ...  This paper discusses a way to communicate without relying on fixed infrastructure at some central hub.  ...  Our techniques leverage the caching and aging properties of DNS records to create a covert channel of sorts that can be used to store ephemeral information.  ... 
doi:10.1109/infcom.2012.6195712 dblp:conf/infocom/CallahanAR12 fatcat:bfogagp27baohmxbi7qrfhq4yu

Poking a Hole in the Wall: Efficient Censorship-Resistant Internet Communications by Parasitizing on WebRTC

Diogo Barradas, Nuno Santos, Luís E. T. Rodrigues, Vítor Nunes
2020 Conference on Computer and Communications Security  
We show that Protozoa is able to evade state-level censorship in China, Russia, and India. CCS CONCEPTS • Security and privacy ! Network security; • Social and professional topics !  ...  statistical properties remain in all identical to those of any common video call.  ...  data encoding technique named encoded media tunneling.  ... 
doi:10.1145/3372297.3417874 dblp:conf/ccs/Barradas0RN20 fatcat:ewsegootsng6jezfuwhozrguva

Secrecy and absence in the residue of covert drone strikes

Oliver Kearns
2017 Political Geography  
A political response to covert strikes must go beyond 'filling in' absences and address how absence gains meaning in implicit, inconspicuous ways.  ...  Intimations from spaces of residue position strikes as too ephemeral and materially insubstantial to understand.  ...  Finally my thanks in particular must go to both Andrew Neal and Xavier Guillaume for their constructive criticism and discussion as the ideas in this paper were developed.  ... 
doi:10.1016/j.polgeo.2016.11.005 fatcat:66i2az6jojhrvbwacf2lcubqoy

The shaping of covert social networks: isolating the effects of secrecy

Nigel G. Fielding
2016 Trends in Organized Crime  
Noting the scarcity of empirical evidence about covert networks and flaws in the conceptualization of how such networks form and operate, this article questions the basis for the assumption that covertness  ...  Accordingly, covertness is treated as an essential feature of organized crime networks and as one of the distinctive characteristics differentiating such networks from others.  ...  distributed under the terms of the Creative Commons Attribution 4.0 International License (, which permits unrestricted use, distribution, and reproduction in  ... 
doi:10.1007/s12117-016-9277-0 fatcat:5rqo6gnthjfh5fapdhrj33xwle

On Securing MAC Layer Broadcast Signals Against Covert Channel Exploitation in 5G, 6G Beyond [article]

Reza Soosahabi
2022 arXiv   pre-print
Examples of covert channel are used in data exfiltration, remote command-and-control (CnC) and espionage.  ...  In this work, we propose a novel framework to identify and mitigate a recently disclosed covert channel scheme exploiting unprotected broadcast messages in cellular MAC layer protocols.  ...  This vulnerability has been responsibly disclosed in GSMA vulnerability disclosure program under the code-name CVD-2021-0045 [7], and its impact on worldwide LTE/5G networks have been presented in [8]  ... 
arXiv:2108.12161v2 fatcat:bfwuijmovvezzalh2ksb4mxahe

Games without Frontiers: Investigating Video Games as a Covert Channel

Bridger Hahn, Rishab Nithyanand, Phillipa Gill, Rob Johnson
2016 2016 IEEE European Symposium on Security and Privacy (EuroS&P)  
In addition, censored users can diversify their covert communications across many different games, making it difficult for a censor to respond by simply blocking a single covert channel.  ...  In this paper, we explore video games as a new avenue for covert channels.  ...  Any opinions, findings, and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the National Science Foundation, Google, or  ... 
doi:10.1109/eurosp.2016.17 dblp:conf/eurosp/HahnNGJ16 fatcat:dvpqbamponco7itf4iiwsxpdpy

Games Without Frontiers: Investigating Video Games as a Covert Channel [article]

Bridger Hahn, Rishab Nithyanand, Phillipa Gill, Rob Johnson
2015 arXiv   pre-print
In this paper, we explore a promising new avenue for covert channels: real-time strategy-video games.  ...  Second, games in the same genre have many common features and concepts. As a result, the same covert channel framework can be easily adapted to work with many different games.  ...  Acknowlegements This material is based in part upon work supported by the National Science Foundation under Grant Number CNS -1350720.  ... 
arXiv:1503.05904v3 fatcat:tfhcbqcvvbgg5kdszladb4tpp4

Enhancing Passwords Security Using Deceptive Covert Communication [chapter]

Mohammed H. Almeshekah, Mikhail J. Atallah, Eugene H. Spafford
2015 IFIP Advances in Information and Communication Technology  
We also introduce a covert communication mechanism between the user's client and the service provider.  ...  Finally, the scheme's covert channel mechanisms give servers the ability to utilize a user's context information -detecting the use of untrusted networks or whether the login was based on a solicitation  ...  As an example, the app can store the name(s) of user's home network(s) and automatically send a covert message when the user is using a non-trusted network to login.  ... 
doi:10.1007/978-3-319-18467-8_11 fatcat:i4v6kqkqjzagbesdh3agpbuboq

Exploiting Temporal Persistence to Detect Covert Botnet Channels [chapter]

Frederic Giroire, Jaideep Chandrashekar, Nina Taft, Eve Schooler, Dina Papagiannaki
2009 Lecture Notes in Computer Science  
We introduce the notion of "destination traffic atoms" which aggregate the destinations and services that are communicated with.  ...  We evaluate our system using extensive user traffic traces collected from an enterprise network, along with collected botnet traces.  ...  The notion of persistence, a key contribution of this work, turns out to be critical in detecting the covert channel communication of botnets.  ... 
doi:10.1007/978-3-642-04342-0_17 fatcat:6erdzg5ozzdbblj7xatoqzvcwu

Security, Privacy, and Access Control in Information-Centric Networking: A Survey [article]

Reza Tourani, Travis Mick, Satyajayant Misra, Gaurav Panwar
2017 arXiv   pre-print
Information-Centric Networking (ICN) is a new networking paradigm, which replaces the widely used host-centric networking paradigm in communication networks (e.g., Internet, mobile ad hoc networks) with  ...  In the broad area of privacy, we discuss user privacy and anonymity, name and signature privacy, and content privacy.  ...  [60] identified two different ways of creating an ephemeral covert channel in named-data networking.  ... 
arXiv:1603.03409v3 fatcat:ynhnoqve3nbzrdvlxy4jigzlkq

With Great Power Comes Great Responsibility: Utilizing Privacy Technology for the Greater Bad [article]

Sarah Cline, Jacob Aronoff
2019 arXiv   pre-print
The first workshop on Privacy Enhancing Technology was in 2000, then called the "Workshop on Design Issues in Anonymity and Unobservability."  ...  In 2015, the first issue of the Proceedings on Privacy Enhancing Technologies journal was published.  ...  Breakthroughs in covert communication channels facilitate the planning and conducting of criminal activity. Disabling the ability to combat cybercrime is an important ethical concern.  ... 
arXiv:2001.00226v1 fatcat:vewc4qytrbahrnlnivvyxiqob4
« Previous Showing results 1 — 15 out of 1,708 results