Construction of Covert Channel Using Data Hiding Mechanism In Ipv4
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2015, Vol 4, Issue 6
Abstract
Covert channel is a way of abstracting the information and hiding the information, in such a way that the reader should not analyse the hidden information and transmit the data to the destination. The covert technique which is used in this paper is unique; it uses the IP fields to hide the data. The data can be malignant software or virus that can be communicated via unauthorized channel. This paper focuses on various techniques which are used to hide the information using IP field hiding as the mechanism and also on vulnerabilities of IPV4 & IPsec.
Authors and Affiliations
Rajesh H, Anjan K
Detection of DDos Attack using HCIF Algorithm in Cloud Computing
Cloud Computing is an emerging buzzword in the IT industry and offers three types of services as Software as a Service (SaaS), Infrastructure as a Service (IaaS) and Platform as a Service (PaaS). To launch a coordinat...
Secure Authentication Schemes
There are different authentication methods to provide security. The most commonly used are textual passwords, but are commonly susceptible to brute -force attacks. Recognition and Recall-based techniques on graphical...
Pipeline Based Distributed and Anonymised Skyline Query Processing
In recent ages handling of large amount of data as well as passing queries to such data is going to become challenging. More advanced query operators are essential to actionable knowledge discovery. Here actionable k...
Vision Defect Identification System (VDIS) using Knowledge Base and Image Processing Framework
In this research paper, a novel system has been designed which is using two discipline of Computer science area which are Artificial intelligence and image Processing. Fuzzy sets and logic has been chosen from AI and...
Para-Scheduling Algorithm for Architectural Framework of Virtual Computing Lab
Our main concern in private cloud computing is to provide sufficient computing resources on demand, however in current architectures like eucalyptus, cluster controller is the sole provider of virtual machines to the...