A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is
By using non-normal channel to transfer the information, the covert channel brings great threats to network security on the one hand, but it provides an effective mechanism to transfer secret information and ensure information security on the other hand. In view of the present covert channel based on single protocol is easy to be detected by statistical rule, covert function not so good and unsuitable to transfer large amount of secret information, the hopping covert channel technique based ondoi:10.12783/dtetr/icmite20162016/4602 fatcat:354asdb3ibdq5m35moibx2j2qq