Using DNS amplification DDoS attack for hiding data
暂无分享,去创建一个
M. Voznak | M. Mikulec | P. Partila | J. Safarik | M. Mehić | M. Voznák | J. Safarik | P. Partila | M. Mehic | M. Mikulec
[1] Sebastian Zander,et al. A survey of covert channels and countermeasures in computer network protocols , 2007, IEEE Communications Surveys & Tutorials.
[2] Wojciech Mazurczyk,et al. Steganalysis of transcoding steganography , 2012, annals of telecommunications - annales des télécommunications.
[3] KRZYSZTOF SZCZYPIORSKI. HICCUPS : Hidden Communication System for Corrupted Networks , 2003 .
[4] Vincent H. Berk,et al. Detection of Covert Channel Encoding in Network Packet Delays , 2005 .
[5] P. S. Tasker,et al. DEPARTMENT OF DEFENSE TRUSTED COMPUTER SYSTEM EVALUATION CRITERIA , 1985 .
[6] Wojciech Mazurczyk,et al. Hiding Information in Retransmissions , 2009, ArXiv.
[7] Michael Graff,et al. Extension Mechanisms for DNS (EDNS(0)) , 2013, Request for Comments.
[8] Wojciech Mazurczyk,et al. Steganography of VoIP Streams , 2008, OTM Conferences.