loading
Papers

Research.Publish.Connect.

Paper

Paper Unlock

Authors: Luis Campo Giralte ; Cristina Conde ; Isaac Martin De Diego and Enrique Cabello

Affiliation: Universidad Rey Juan Carlos, Spain

ISBN: 978-989-8565-73-0

Keyword(s): Storage Covert Channel, Network Flow, P2P Applications.

Related Ontology Subjects/Areas/Topics: Data and Application Security and Privacy ; Data Protection ; Information and Systems Security ; Information Assurance ; Information Hiding ; Network Security ; Wireless Network Security

Abstract: This article proposes and implements a light-weight covert channel called InCC, which is designed to produce a undetectable communication channel between systems. This channel, fully transparent to any network analysis, is able to send messages on the same production network without compromising its existence. By using techniques like encryption, address spoofing, signatures and traffic analysis, the channel is able to hide the flows on the network without compromising the source and destination.

PDF ImageFull Text

Download
CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 3.92.92.168

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Campo Giralte, L.; Conde, C.; Martin De Diego, I. and Cabello, E. (2013). InCC: Hiding Information by Mimicking Traffic In Network Flows.In Proceedings of the 10th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2013) ISBN 978-989-8565-73-0, pages 5-14. DOI: 10.5220/0004436600050014

@conference{secrypt13,
author={Luis Campo Giralte. and Cristina Conde. and Isaac Martin De Diego. and Enrique Cabello.},
title={InCC: Hiding Information by Mimicking Traffic In Network Flows},
booktitle={Proceedings of the 10th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2013)},
year={2013},
pages={5-14},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0004436600050014},
isbn={978-989-8565-73-0},
}

TY - CONF

JO - Proceedings of the 10th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2013)
TI - InCC: Hiding Information by Mimicking Traffic In Network Flows
SN - 978-989-8565-73-0
AU - Campo Giralte, L.
AU - Conde, C.
AU - Martin De Diego, I.
AU - Cabello, E.
PY - 2013
SP - 5
EP - 14
DO - 10.5220/0004436600050014

Login or register to post comments.

Comments on this Paper: Be the first to review this paper.