Web proceedings papers

Authors

Boris Panajotov and Aleksandra Mileva

Abstract

We give a survey of different techniques for hiding data in several protocols from the TCP/IP protocol stack. Techniques are organized according to affected layer and protocol. For every covert channel its data bandwidth is given.

Keywords

covert channels, TCP/IP, netwotk steganography.