An Empirical Evaluation of IP Time To Live Covert Channels
暂无分享,去创建一个
[1] Maarten Van Horenbeeck,et al. Deception on the network: thinking differently about covert channels , 2006 .
[2] Grzegorz Lewandowski,et al. Covert Channels in IPv6 , 2005, Privacy Enhancing Technologies.
[3] Kang G. Shin,et al. Hop-count filtering: an effective defense against spoofed DDoS traffic , 2003, CCS '03.
[4] Sebastian Zander,et al. Covert channels in the IP time to live field , 2006 .
[5] Richard A. Silverman. On binary channels and their cascades , 1955, IRE Trans. Inf. Theory.
[6] Jürgen Falb,et al. The Internet Protocol , 2005, The Industrial Information Technology Handbook.
[7] Gustavus J. Simmons,et al. The Prisoners' Problem and the Subliminal Channel , 1983, CRYPTO.
[8] Dengguo Feng,et al. A typical noisy covert channel in the IP protocol , 2004, 38th Annual 2004 International Carnahan Conference on Security Technology, 2004..
[9] Mike Fisk,et al. Eliminating Steganography in Internet Traffic with Active Wardens , 2002, Information Hiding.
[10] Butler W. Lampson,et al. A note on the confinement problem , 1973, CACM.
[11] Thomas M. Cover,et al. Elements of Information Theory , 2005 .
[12] Sebastian Zander,et al. Dynamics of the IP Time To Live Field in Internet Traffic Flows , 2007 .
[13] Sebastian Zander,et al. A survey of covert channels and countermeasures in computer network protocols , 2007, IEEE Communications Surveys & Tutorials.