Please use this identifier to cite or link to this item: http://dspace.dtu.ac.in:8080/jspui/handle/123456789/320
Full metadata record
DC FieldValueLanguage
dc.contributor.authorHAKIMUDDIN-
dc.date.accessioned2010-11-15T11:01:10Z-
dc.date.available2010-11-15T11:01:10Z-
dc.date.issued2009-07-23-
dc.identifier.urihttp://dspace.dtu.ac.in:8080/jspui/handle/123456789/320-
dc.descriptionME THESISen_US
dc.description.abstractCovert channels are used for the secret transfer of information. Encryption only protects communication from being decoded by unauthorized parties, whereas covert channels aim to hide the very existence of the communication. Initially, covert channels were identified as a security threat on monolithic systems i.e. mainframes. More recently focus has shifted towards covert channels in computer network protocols. The huge amount of data and vast number of different protocols in the Internet seems ideal as a high-bandwidth vehicle for covert communication. This thesis gives a brief overview of covert channels in communication networks, and presents a brief survey of some recent and relevant papers on the use of covert channels in the common Internet protocols, we describe the covert channel concept and weaknesses in the five layered TCP/IP layered model. We also explored the various covert channel carried in TCP/IP protocol suite the mechanisms to detect common covert channels in TCP/IP ...en_US
dc.language.isoenen_US
dc.relation.ispartofseriesTD546;55-
dc.subjectCovert Channelen_US
dc.subjectTCP/IP Protocolen_US
dc.titleCOVERT CHANNEL AND DATA HIDING IN TCP/IP PROTOCOL SUITEen_US
Appears in Collections:M.E./M.Tech. Computer Technology & Applications

Files in This Item:
File Description SizeFormat 
Thesis+-+Colored.doc250.5 kBMicrosoft WordView/Open
Table+of+Contents.doc130.5 kBMicrosoft WordView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.