Murdoch University Research Repository

Welcome to the Murdoch University Research Repository

The Murdoch University Research Repository is an open access digital collection of research
created by Murdoch University staff, researchers and postgraduate students.

Learn more

Covert channels and countermeasures in computer network protocols

Zander, S., Armitage, G. and Branch, P. (2007) Covert channels and countermeasures in computer network protocols. IEEE Communications Magazine, 45 (12). pp. 136-142.

Link to Published Version:
*Subscription may be required


Covert channels are used for the secret transfer of information. Encryption only protects communication from being decoded by unauthorized parties, whereas covert channels aim to hide the very existence of the communication. Initially, covert channels were identified as a security threat on monolithic systems such as mainframes. More recently, focus has shifted toward covert channels in computer network protocols. The huge amount of data and large number of different protocols in the Internet is ideal as a high-bandwidth vehicle for covert communication. This article provides an overview of the existing techniques for creating covert channels in widely deployed network protocols, and common methods for their detection, elimination, and capacity limitation.

Item Type: Journal Article
Publisher: IEEE
Copyright: © 2007 IEEE
Item Control Page Item Control Page