scholarly journals A Survey of Key Technologies for Constructing Network Covert Channel

2020 ◽  
Vol 2020 ◽  
pp. 1-20
Author(s):  
Jing Tian ◽  
Gang Xiong ◽  
Zhen Li ◽  
Gaopeng Gou

In order to protect user privacy or guarantee free access to the Internet, the network covert channel has become a hot research topic. It refers to an information channel in which the messages are covertly transmitted under the network environment. In recent years, many new construction schemes of network covert channels are proposed. But at the same time, network covert channel has also received the attention of censors, leading to many attacks. The network covert channel refers to an information channel in which the messages are covertly transmitted under the network environment. Many users exploit the network covert channel to protect privacy or guarantee free access to the Internet. Previous construction schemes of the network covert channel are based on information steganography, which can be divided into CTCs and CSCs. In recent years, there are some covert channels constructed by changing the transmission network architecture. On the other side, some research work promises that the characteristics of emerging network may better fit the construction of the network covert channel. In addition, the covert channel can also be constructed by changing the transmission network architecture. The proxy and anonymity communication technology implement this construction scheme. In this paper, we divide the key technologies for constructing network covert channels into two aspects: communication content level (based on information steganography) and transmission network level (based on proxy and anonymity communication technology). We give an comprehensively summary about covert channels at each level. We also introduce work for the three new types of network covert channels (covert channels based on streaming media, covert channels based on blockchain, and covert channels based on IPv6). In addition, we present the attacks against the network covert channel, including elimination, limitation, and detection. Finally, the challenge and future research trend in this field are discussed.

2012 ◽  
Vol 220-223 ◽  
pp. 2528-2533
Author(s):  
Ran Zhang ◽  
Yong Gan ◽  
Yi Feng Yin

Network covert channel is a steganography technology that uses network traffic data as a carrier to transfer the secret data. This paper analyzes the working principle of network covert channels, and summarizes the commonly used construction technology of network covert channels. Then it analyzes the characteristics of the HTTP header lines and gives some methods of constructing network covert channels with these characteristics. Network covert channels based on the HTTP header lines are simple, flexible, and difficult to be detected and shielded.


2018 ◽  
Vol 7 (2.4) ◽  
pp. 62
Author(s):  
G Yuvaraj ◽  
Siva Rama Lingham N ◽  
Rajkamal J

A mechanism that is intended to expose information against a security violation in a network is the use of network covert channel and it is difficult to detect information about data loss like location of loss using network covert channel. To identify the covert channel were the data pattern missing over the sharing of resources in networks. Several mechanisms are used to identify a large variation of covert channels. However, those mechanisms have more limitation like speed of detection, detection accuracy etc. In this paper, a new machine learning approaches called “Support Vector Machine and Hyperbolic Hopfield Neural Network” to overcome the drawbacks of existing methods. This approach is supported to classifying the different covert channels with data packets which is shared in networks and its supports to identifying the location of data loss or data pattern mismatched. Finally, the proposed methods properly detected covert channels with high accuracy and less detection high speed shared a network resources in effective manner.  


Mousaion ◽  
2016 ◽  
Vol 34 (1) ◽  
pp. 83-100
Author(s):  
Solomon Bopape

The study of law focuses, among other aspects, on important issues relating to equality, fairness and justice in as far as free access to information and knowledgeis concerned. The launching of the Open Access to Law Movement in 1992, the promulgation of the Durham Statement on Open Access to Legal Scholarshipin 2009, and the formation of national and regional Legal Information Institutes (LIIs) should serve as an indication of how well the legal world is committed to freely publishing and distributing legal information and knowledge through the Internet to legal practitioners, legal scholars and the public at large aroundthe world. In order to establish the amount of legal scholarly content which is accessible through open access publishing innovations and initiatives, this studyanalysed the contents of websites for selected open access resources on the Internet internationally and in South Africa. The results of the study showed that there has been a steady developing trend towards the adoption of open access for legal scholarly literature internationally, while in South Africa legal scholarly literature is under the control of commercial publishers. This should be an issue for the legal scholarship which, among its focus, is to impart knowledge about the right of access to information and knowledge.


2018 ◽  
Vol 1 (2) ◽  
pp. 12
Author(s):  
Pedro Vitor de Sousa Guimarães ◽  
Sandro César Silveira Jucá ◽  
Renata Imaculada Soares Pereira ◽  
Ayrton Alexsander Monteiro Monteiro

This paper describes the use of a Linux embedded system for use in digital information and communication technology in order to generate image warnings using Internet of Things (IoT) prin- ciples. The proposed project generated a product, developed using concepts of project-based learning (ABP), called SECI (electronic internal communication system) that is accessed by students to view online warnings by distributed monitors and also by mobile devices connected to the Internet.


2021 ◽  
Vol 11 (4) ◽  
pp. 1589
Author(s):  
Lourdes S. M. Alwis ◽  
Kort Bremer ◽  
Bernhard Roth

Optics and photonics are among the key technologies of the 21st century and offer the potential for novel applications in areas as diverse as sensing and spectroscopy, analytics, monitoring, biomedical imaging and diagnostics, as well as optical communication technology, among others [...]


Author(s):  
Lucy Osler ◽  
Joel Krueger

AbstractIn this paper, we introduce the Japanese philosopher Tetsurō Watsuji’s phenomenology of aidagara (“betweenness”) and use his analysis in the contemporary context of online space. We argue that Watsuji develops a prescient analysis anticipating modern technologically-mediated forms of expression and engagement. More precisely, we show that instead of adopting a traditional phenomenological focus on face-to-face interaction, Watsuji argues that communication technologies—which now include Internet-enabled technologies and spaces—are expressive vehicles enabling new forms of emotional expression, shared experiences, and modes of betweenness that would be otherwise inaccessible. Using Watsuji’s phenomenological analysis, we argue that the Internet is not simply a sophisticated form of communication technology that expresses our subjective spatiality (although it is), but that it actually gives rise to new forms of subjective spatiality itself. We conclude with an exploration of how certain aspects of our online interconnections are hidden from lay users in ways that have significant political and ethical implications.


2021 ◽  
Vol 791 (1) ◽  
pp. 012151
Author(s):  
Guohui Chen ◽  
Hongliang Wei ◽  
Yizhu Zhang ◽  
Chao Guo ◽  
Shuo Shi ◽  
...  

1999 ◽  
Vol 40 (1) ◽  
pp. 97-104
Author(s):  
Susan Brady

Over the past decade academic and research libraries throughout the world have taken advantage of the enormous developments in communication technology to improve services to their users. Through the Internet and the World Wide Web researchers now have convenient electronic access to library catalogs, indexes, subject bibliographies, descriptions of manuscript and archival collections, and other resources. This brief overview illustrates how libraries are facilitating performing arts research in new ways.


Sign in / Sign up

Export Citation Format

Share Document