Construction of Covert Channel Using Data Hiding Mechanism In Ipv4

Abstract

Covert channel is a way of abstracting the information and hiding the information, in such a way that the reader should not analyse the hidden information and transmit the data to the destination. The covert technique which is used in this paper is unique; it uses the IP fields to hide the data. The data can be malignant software or virus that can be communicated via unauthorized channel. This paper focuses on various techniques which are used to hide the information using IP field hiding as the mechanism and also on vulnerabilities of IPV4 & IPsec.

Authors and Affiliations

Rajesh H, Anjan K

Keywords

Related Articles

Detection of DDos Attack using HCIF Algorithm in Cloud Computing

Cloud Computing is an emerging buzzword in the IT industry and offers three types of services as Software as a Service (SaaS), Infrastructure as a Service (IaaS) and Platform as a Service (PaaS). To launch a coordinat...

Secure Authentication Schemes

There are different authentication methods to provide security. The most commonly used are textual passwords, but are commonly susceptible to brute -force attacks. Recognition and Recall-based techniques on graphical...

Pipeline Based Distributed and Anonymised Skyline Query Processing

In recent ages handling of large amount of data as well as passing queries to such data is going to become challenging. More advanced query operators are essential to actionable knowledge discovery. Here actionable k...

Vision Defect Identification System (VDIS) using Knowledge Base and Image Processing Framework

In this research paper, a novel system has been designed which is using two discipline of Computer science area which are Artificial intelligence and image Processing. Fuzzy sets and logic has been chosen from AI and...

Para-Scheduling Algorithm for Architectural Framework of Virtual Computing Lab

Our main concern in private cloud computing is to provide sufficient computing resources on demand, however in current architectures like eucalyptus, cluster controller is the sole provider of virtual machines to the...

Download PDF file
  • EP ID EP28200
  • DOI -
  • Views 276
  • Downloads 2

How To Cite

Rajesh H, Anjan K (2015). Construction of Covert Channel Using Data Hiding Mechanism In Ipv4. International Journal of Research in Computer and Communication Technology, 4(6), -. https://www.europub.co.uk/articles/-A-28200