Covert computer and network communications

  • Authors:
  • Robert C. Newman

  • Affiliations:
  • Georgia Southern University, Statesboro, Ga

  • Venue:
  • Proceedings of the 4th annual conference on Information security curriculum development
  • Year:
  • 2007

Quantified Score

Hi-index 0.00

Visualization

Abstract

The ex-filtration of confidential information across communication networks is a challenging problem. It is possible for transmissions to be hidden or masked in such a way to circumvent the security policies of an organization. An objective might be to make contacts "invisible" to all parties except designates. This can take the form of a covert channel [3]. A covert channel is described as: "any communication channel that can be exploited by a process to transfer information in a manner that violates the systems security policy." Covert channels can be the vehicle used to breach a computer network for the purpose of downloading tools from outside, uploading internal data to the outside, and communicating to outside parties. Internal users may want to use forbidden protocols, have non-malicious backdoor access, and hide their actions from management. Covert channels provide an alternative, subversive means of achieving confidentiality and maintaining anonymity.