A Review on Covert Techniques

Author
Marcelo Santos, Luis Barroso
View Count
1867
License
Creative Commons CC BY 4.0
Abstract

Due to the widespread adoption of the internet and its services, protocols have been established and new ones arise every year. Either for securing connections, ciphering information or service authentication, protocols place an important part in network communications. The TCP/IP has become one of the ubiquitous protocol suites for secure communication, and therefore, a desirable target for covert information encapsulation. In this article, we will discuss the art of unauthorized data transfer - covert techniques - for data encapsulation in protocol data packets, emphasizing headers fields manipulation.

A Review on Covert Techniques